PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following technical means can the consultant use to determine the manufacturer and likely operati

The security manager of a company has hired an external consultant to conduct a security
assessment of the company network. The contract stipulates that the consultant is not allowed to
transmit any data on the company network while performing wired and wireless security
assessments. Which of the following technical means can the consultant use to determine the
manufacturer and likely operating system of the company wireless and wired network devices, as
well as the computers connected to the company network?

Which of the following BEST covers the data lifecycle end-to-end?

In order for a company to boost profits by implementing cost savings on non-core business
activities, the IT manager has sought approval for the corporate email system to be hosted in the
cloud. The compliance officer has been tasked with ensuring that data lifecycle issues are taken
into account. Which of the following BEST covers the data lifecycle end-to-end?

Which of the following is the MOST suitable integration platform to provide event-driven and standards-based s

A large organization has gone through several mergers, acquisitions, and de-mergers over the
past decade. As a result, the internal networks have been integrated but have complex
dependencies and interactions between systems. Better integration is needed in order to simplify
the underlying complexity. Which of the following is the MOST suitable integration platform to
provide event-driven and standards-based secure software architecture?

which of the following is the BEST recommendation for the CIO to make?

The Chief Information Officer (CIO) of a technology company is likely to move away from a deperimeterized model for employee owned devices. This is because there were too many issues

with lack of patching, malware incidents, and data leakage due to lost/stolen devices which did not
have full-disk encryption. The ‘bring your own computing’ approach was originally introduced
because different business units preferred different operating systems and application stacks.
Based on the issues and user needs, which of the following is the BEST recommendation for the
CIO to make?