PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following can the security administrator determine from the above information?

The helpdesk is receiving multiple calls about slow and intermittent Internet access from the

finance department. The network administrator reviews the tickets and compiles the following
information for the security administrator:
——
Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0
Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0
Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0
All callers are connected to the same switch and are routed by a router with five built-in interfaces.
The upstream router interface’s MAC is 00-01-42-32-ab-1a
——
The security administrator brings a laptop to the finance office, connects it to one of the wall jacks,
starts up a network analyzer, and notices the following:
09:05:10.937590 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)
09:05:15.934840 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)
09:05:19.931482 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)
Which of the following can the security administrator determine from the above information?

Which of the following has the GREATEST impact on the ability to fulfill the e-discovery request?

On Monday, the Chief Information Officer (CIO) of a state agency received an e-discovery request
for the release of all emails sent and received by the agency board of directors for the past five
years. The CIO has contacted the email administrator and asked the administrator to provide the
requested information by end of day on Friday. Which of the following has the GREATEST impact
on the ability to fulfill the e-discovery request?

Which of the following are the major risks the security administrator should report back to the CIO?

A company is evaluating a new marketing strategy involving the use of social networking sites to
reach its customers. The marketing director wants to be able to report important company news,
product updates, and special promotions on the social websites.
After an initial and successful pilot period, other departments want to use the social websites to
post their updates as well.
The Chief Information Officer (CIO) has asked the company security administrator to document
three negative security impacts of allowing IT staff to post work related information on such
websites.
Which of the following are the major risks the security administrator should report back to the CIO?
(Select THREE).