Which of the following administrative controls should be implemented to BEST achieve this?
A company storing data on a secure server wants to ensure it is legally able to dismiss and
prosecute staff who intentionally access the server via Telnet and illegally tamper with
customer data. Which of the following administrative controls should be implemented to
BEST achieve this?
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following protocols is used to authenticate the client and server’s digital
certificate?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of d
Which of the following security concepts would Sara, the security administrator, use to
mitigate the risk of data loss?
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?
Which of the following is this an example of?
After Matt, a user, enters his username and password at the login screen of a web enabled
portal, the following appears on his screen:
`Please only use letters and numbers on these fields’
Which of the following is this an example of?
Which of the following should the security administrator implement to limit web traffic based on country of or
Which of the following should the security administrator implement to limit web traffic based
on country of origin? (Select THREE).
Which of the following does this prevent?
Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
Which of the following is MOST likely affected?
Matt, a developer, recently attended a workshop on a new application. The developer installs
the new application on a production system to test the functionality. Which of the following is
MOST likely affected?
which of the following?
Sara, a company’s security officer, often receives reports of unauthorized personnel having
access codes to the cipher locks of secure areas in the building. Sara should immediately
implement which of the following?