PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following BEST describes the risk assurance officer’s concerns?

The Chief Technology Officer (CTO) has decided that servers in the company datacenter should
be virtualized to conserve physical space. The risk assurance officer is concerned that the project
team in charge of virtualizing servers plans to co-mingle many guest operating systems with
different security requirements to speed up the rollout and reduce the number of host operating
systems or hypervisors required.
Which of the following BEST describes the risk assurance officer’s concerns?

Which of the following would make a NAS unsuitable for a business critical, high volume database application &

Due to cost and implementation time pressures, a security architect has allowed a NAS to be used
instead of a SAN for a non-critical, low volume database. Which of the following would make a
NAS unsuitable for a business critical, high volume database application that required a high
degree of data confidentiality and data availability? (Select THREE).

Training and awareness of the new policies and procedures has been incorporated into the security awareness pr

As part of the ongoing information security plan in a large software development company, the
Chief Information officer (CIO) has decided to review and update the company’s privacy policies
and procedures to reflect the changing business environment and business requirements.
Training and awareness of the new policies and procedures has been incorporated into the
security awareness program which should be:

Which of the following controls would BEST protect the corporate network?

Staff from the sales department have administrator rights to their corporate standard operating
environment, and often connect their work laptop to customer networks when onsite during
meetings and presentations. This increases the risk and likelihood of a security incident when the
sales staff reconnects to the corporate LAN. Which of the following controls would BEST protect
the corporate network?