PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following options is BEST suited to run the password auditing software and produce a report in th

A security administrator wants to perform an audit of the company password file to ensure users
are not using personal information such as addresses and birthdays as part of their password. The
company employs 200,000 users, has virtualized environments with cluster and cloud-based
computing resources, and enforces a minimum password length of 14 characters. Which of the
following options is BEST suited to run the password auditing software and produce a report in the
SHORTEST amount of time?

Which of the following should the network administrator do to resolve the performance issue after analyzing th

The network administrator has been tracking the cause of network performance problems and
decides to take a look at the internal and external router stats.

Which of the following should the network administrator do to resolve the performance issue after
analyzing the above information?

Which of the following should the security administrator report to upper management based on the above output?

The security administrator at ‘company.com’ is reviewing the network logs and notices a new UDP
port pattern where the amount of UDP port 123 packets has increased by 20% above the
baseline. The administrator runs a packet capturing tool from a server attached to a SPAN port
and notices the following.
UDP 192.168.0.1:123 -> 172.60.3.0:123
UDP 192.168.0.36:123 -> time.company.com
UDP 192.168.0.112:123 -> 172.60.3.0:123
UDP 192.168.0.91:123 -> time.company.com
UDP 192.168.0.211:123 -> 172.60.3.0:123
UDP 192.168.0.237:123 -> time.company.com
UDP 192.168.0.78:123 -> 172.60.3.0:123
The corporate HIPS console reports an MD5 hash mismatch on the svchost.exe file of the
following computers:
192.168.0.1
192.168.0.112
192.168.0.211
192.168.0.78
Which of the following should the security administrator report to upper management based on the
above output?

Which of the following is the recommendation the IT Director should present to senior staff?

A mid-level company is rewriting its security policies and has halted the rewriting progress
because the company’s executives believe that its major vendors, who have cultivated a strong
personal and professional relationship with the senior level staff, have a good handle on
compliance and regulatory standards. Therefore, the executive level managers are allowing
vendors to play a large role in writing the policy. Having experienced this type of environment in
previous positions, and being aware that vendors may not always put the company’s interests first,
the IT Director decides that while vendor support is important, it is critical that the company writes
the policy objectively. Which of the following is the recommendation the IT Director should present
to senior staff?