PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following solutions should the security administrator implement?

A new company requirement mandates the implementation of multi-factor authentication to access
network resources. The security administrator was asked to research and implement the most
cost-effective solution that would allow for the authentication of both hardware and users. The
company wants to leverage the PKI infrastructure which is already well established. Which of the
following solutions should the security administrator implement?

Which of the following should the auditor suggest be done to avoid future security breaches?

The internal audit department is investigating a possible breach of security. One of the auditors is
sent to interview the following employees:
Employee A. Works in the accounts receivable office and is in charge of entering data into the
finance system.
Employee B. Works in the accounts payable office and is in charge of approving purchase orders.
Employee C. Is the manager of the finance department, supervises Employee A and Employee B,
and can perform the functions of both Employee A and Employee B.
Which of the following should the auditor suggest be done to avoid future security breaches?

Which of the following is the MOST comprehensive method for evaluating the two platforms?

An organization is preparing to upgrade its firewall and NIPS infrastructure and has narrowed the
vendor choices down to two platforms. The integrator chosen to assist the organization with the
deployment has many clients running a mixture of the possible combinations of environments.
Which of the following is the MOST comprehensive method for evaluating the two platforms?

Which of the following would allow the administrator to securely connect to and manage the host server during

An administrator has four virtual guests on a host server. Two of the servers are corporate SQL
servers, one is a corporate mail server, and one is a testing web server for a small group of
developers. The administrator is experiencing difficulty connecting to the host server during peak
network usage times. Which of the following would allow the administrator to securely connect to
and manage the host server during peak usage times?