PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following is the MOST complete list of end-point security software the administrator could plan t

After implementing port security, restricting all network traffic into and out of a network, migrating
to IPv6, installing NIDS, firewalls, spam and application filters, a security administer is convinced
that the network is secure. The administrator now focuses on securing the hosts on the network,
starting with the servers.
Which of the following is the MOST complete list of end-point security software the administrator
could plan to implement?

Mark the option that you will choose to check the Internet security settings and User Account Control settings

You work as an Office Assistant in Tech Perfect Inc. All computers in the company run the Windows
Vista operating system. Some users report you that their systems display a notification and put a
Security Center icon in the notification area. You check the issue and experience that the Internet
settings or User Account Control settings are changed to a security level which is not recommended.
You open Windows Security Center. Mark the option that you will choose to check the Internet
security settings and User Account Control settings.

The secure coding standards will contain detailed standards for:

A security architect is assigned to a major software development project. The software
development team has a history of writing bug prone, inefficient code, with multiple security flaws
in every release. The security architect proposes implementing secure coding standards to the
project manager. The secure coding standards will contain detailed standards for:

Which of the following BEST describes the problem that is occurring, a good mitigation technique to use to pre

A number of security incidents have been reported involving mobile web-based code developed by
a consulting company. Performing a root cause analysis, the security administrator of the
consulting company discovers that the problem is a simple programming error that results in extra
information being loaded into the memory when the proper format is selected by the user. After
repeating the process several times, the security administrator is able to execute unintentional
instructions through this method. Which of the following BEST describes the problem that is
occurring, a good mitigation technique to use to prevent future occurrences, and why it a security
concern?