PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following BEST meets these requirements?

A hosting company provides inexpensive guest virtual machines to low-margin customers.
Customers manage their own guest virtual machines. Some customers want basic guarantees of
logical separation from other customers and it has been indicated that some customers would like
to have configuration control of this separation; whereas others want this provided as a valueadded service by the hosting company. Which of the following BEST meets these requirements?

Which of the following recommendations should the consultant provide to the security administrator?

A financial company implements end-to-end encryption via SSL in the DMZ, and only IPSec in
transport mode with AH enabled and ESP disabled throughout the internal network. The company
has hired a security consultant to analyze the network infrastructure and provide a solution for
intrusion prevention. Which of the following recommendations should the consultant provide to the
security administrator?

Which of the following lines of code will result in the STRONGEST seed when combined?

A developer is coding the crypto routine of an application that will be installed on a standard
headless and diskless server connected to a NAS housed in the datacenter. The developer has
written the following six lines of code to add entropy to the routine:
1 – If VIDEO input exists, use video data for entropy
2 – If AUDIO input exists, use audio data for entropy
3 – If MOUSE input exists, use mouse data for entropy
4 – IF KEYBOARD input exists, use keyboard data for entropy
5 – IF IDE input exists, use IDE data for entropy

6 – IF NETWORK input exists, use network data for entropy
Which of the following lines of code will result in the STRONGEST seed when combined?

which of the following to the three submitting firms?

After three vendors submit their requested documentation, the CPO and the SPM can better
understand what each vendor does and what solutions that they can provide. But now they want to
see the intricacies of how these solutions can adequately match the requirements needed by the
firm. Upon the directive of the CPO, the CISO should submit which of the following to the three
submitting firms?