PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following solutions minimizes the performance impact on the router?

Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions.
When speaking with the network administrator, the security administrator learns that the existing
routers have the minimum processing power to do the required level of encryption. Which of the
following solutions minimizes the performance impact on the router?

Which of the following statements BEST describes this situation?

A business owner has raised concerns with the Chief Information Security Officer (CISO) because
money has been spent on IT security infrastructure, but corporate assets are still found to be
vulnerable. The business recently implemented a patch management product and SOE hardening
initiative. A third party auditor reported findings against the business because some systems were
missing patches. Which of the following statements BEST describes this situation?

Which of the following is the penetration tester MOST likely to use while performing black box testing of the

Company XYZ has purchased and is now deploying a new HTML5 application. The company
wants to hire a penetration tester to evaluate the security of the client and server components of
the proprietary web application before launch. Which of the following is the penetration tester
MOST likely to use while performing black box testing of the security of the company’s purchased
application? (Select TWO).

Which of the following would MOST likely be implemented to meet the above requirements and provide a secure so

A company has been purchased by another agency and the new security architect has identified
new security goals for the organization. The current location has video surveillance throughout the
building and entryways. The following requirements must be met:
1. Ability to log entry of all employees in and out of specific areas
2. Access control into and out of all sensitive areas
3. Two-factor authentication
Which of the following would MOST likely be implemented to meet the above requirements and
provide a secure solution? (Select TWO).

Which of the following security measures would be MOST effective in securing the enterprise under the new poli

In order to reduce costs and improve employee satisfaction, a large corporation is creating a
BYOD policy. It will allow access to email and remote connections to the corporate enterprise from
personal devices; provided they are on an approved device list. Which of the following security
measures would be MOST effective in securing the enterprise under the new policy? (Select
TWO).