PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following scenarios BEST accomplishes this goal?

A system administrator has installed a new Internet facing secure web application that consists of
a Linux web server and Windows SQL server into a new corporate site. The administrator wants to
place the servers in the most logical network security zones and implement the appropriate
security controls. Which of the following scenarios BEST accomplishes this goal?

Which of the following is the BEST course of action for the network engineer to take?

The lead systems architect on a software development project developed a design which is
optimized for a distributed computing environment. The security architect assigned to the project
has concerns about the integrity of the system, if it is deployed in a commercial cloud. Due to poor
communication within the team, the security risks of the proposed design are not being given any
attention. A network engineer on the project has a security background and is concerned about
the overall success of the project. Which of the following is the BEST course of action for the
network engineer to take?

Which of the following is the BEST course of action for the security administrator to take?

Company XYZ plans to donate 1,000 used computers to a local school. The company has a large
research and development section and some of the computers were previously used to store
proprietary research.
The security administrator is concerned about data remnants on the donated machines, but the
company does not have a device sanitization section in the data handling policy.
Which of the following is the BEST course of action for the security administrator to take?

Which of the following is the BEST course of action for the junior security administrator to take?

The Chief Information Security Officer (CISO) regularly receives reports of a single department
repeatedly violating the corporate security policy. The head of the department in question informs
the CISO that the offending behaviors are a result of necessary business activities. The CISO
assigns a junior security administrator to solve the issue. Which of the following is the BEST
course of action for the junior security administrator to take?

Which of the following is the BEST methodology to use in establishing this baseline?

A security administrator at Company XYZ is trying to develop a body of knowledge to enable
heuristic and behavior based security event monitoring of activities on a geographically distributed
network. Instrumentation is chosen to allow for monitoring and measuring the network. Which of
the following is the BEST methodology to use in establishing this baseline?