PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following sets of commands would meet this requirement?

Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be
accessed using the same password. The company’s network device security policy mandates that
at least one virtual terminal have a different password than the other virtual terminals. Which of the
following sets of commands would meet this requirement?

Which of the following could the technician use to prepare the report?

Joe, an employee, was escorted from the company premises due to suspicion of revealing trade
secrets to a competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s
integrity scan. Which of the following could the technician use to prepare the report? (Select
TWO).

Which of the following methods should the company consider to secure this data in the future?

Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles
of a particular vendor. Which of the following methods should the company consider to secure this
data in the future?

Which of the following methods should the system administrator implement?

A new intern was assigned to the system engineering department, which consists of the system
architect and system software developer’s teams. These two teams have separate privileges. The
intern requires privileges to view the system architectural drawings and comment on some
software development projects. Which of the following methods should the system administrator
implement?