PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which of the following needs to be incorporated into the SOA?

A security administrator is redesigning, and implementing a service-oriented architecture to
replace an old, in-house software processing system, tied to a corporate sales website. After
performing the business process analysis, the administrator decides the services need to operate
in a dynamic fashion. The company has also been the victim of data injection attacks in the past
and needs to build in mitigation features. Based on these requirements and past vulnerabilities,
which of the following needs to be incorporated into the SOA?

Which of the following BEST describes the purpose of an SRTM in this scenario?

A team of security engineers has applied regulatory and corporate guidance to the design of a
corporate network. The engineers have generated an SRTM based on their work and a thorough
analysis of the complete set of functional and performance requirements in the network
specification. Which of the following BEST describes the purpose of an SRTM in this scenario?

Which of the following is the hosting company MOST likely trying to achieve?

A small company hosting multiple virtualized client servers on a single host is considering adding a
new host to create a cluster. The new host hardware and operating system will be different from
the first host, but the underlying virtualization technology will be compatible. Both hosts will be
connected to a shared iSCSI storage solution. Which of the following is the hosting company
MOST likely trying to achieve?

Which of the following is true?

A security administrator is conducting network forensic analysis of a recent defacement of the
company’s secure web payment server (HTTPS). The server was compromised around the New
Year’s holiday when all the company employees were off. The company’s network diagram is
summarized below:
Internet
Gateway Firewall
IDS
Web SSL Accelerator
Web Server Farm
Internal Firewall
Company Internal Network

The security administrator discovers that all the local web server logs have been deleted.
Additionally, the Internal Firewall logs are intact but show no activity from the internal network to
the web server farm during the holiday.
Which of the following is true?

which of the following would be the MOST applicable for implementation?

A security consultant is called into a small advertising business to recommend which security
policies and procedures would be most helpful to the business. The business is comprised of 20
employees, operating off of two shared servers. One server houses employee data and the other

houses client data. All machines are on the same local network. Often these employees must work
remotely from client sites, but do not access either of the servers remotely. Assuming no security
policies or procedures are in place right now, which of the following would be the MOST applicable
for implementation? (Select TWO).