PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

This review process depends on:

A computer is suspected of being compromised by malware. The security analyst examines
the computer and finds that a service called Telnet is running and connecting to an external
website over port 443. This Telnet service was found by comparing the system’s services to
the list of standard services on the company’s system image. This review process depends
on:

which of the following core security areas?

A software company has completed a security assessment. The assessment states that the
company should implement fencing and lighting around the property. Additionally, the
assessment states that production releases of their software should be digitally signed.
Given the recommendations, the company was deficient in which of the following core
security areas? (Select TWO).