which of the following?
One of the system administrators at a company is assigned to maintain a secure computer lab.
The administrator has rights to configure machines, install software, and perform user account
maintenance. However, the administrator cannot add new computers to the domain, because that
requires authorization from the Information Assurance Officer. This is an example of which of the
following?
Which of the following options would be the BEST solution at a minimal cost?
A small business needs to incorporate fault tolerance into their infrastructure to increase data
availability. Which of the following options would be the BEST solution at a minimal cost?
Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server
that is used by several employees.
Which of the following is the BEST approach for implementation of the new application on the
virtual server?
Which of the following should Ann use in order to sign the file?
Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign
the file?
Which of the following is MOST likely to protect the SCADA systems from misuse?
During a recent investigation, an auditor discovered that an engineer’s compromised workstation
was being used to connect to SCADA systems while the engineer was not logged in. The engineer
is responsible for administering the SCADA systems and cannot be blocked from connecting to
them. The SCADA systems cannot be modified without vendor approval which requires months of
testing.
Which of the following is MOST likely to protect the SCADA systems from misuse?
Which of the following protocols is used to validate whether trust is in place and accurate by returning respo
Which of the following protocols is used to validate whether trust is in place and accurate by
returning responses of either “good”, “unknown”, or “revoked”?
Which of the following should the administrator implement?
A security administrator must implement a network authentication solution which will ensure
encryption of user credentials when users enter their username and password to authenticate to
the network.
Which of the following should the administrator implement?
Which of the following would be the BEST control to implement?
Several employees have been printing files that include personally identifiable information of
customers. Auditors have raised concerns about the destruction of these hard copies after they
are created, and management has decided the best way to address this concern is by preventing
these files from being printed.
Which of the following would be the BEST control to implement?
Which of the following controls is preventing them from completing their work?
The company’s sales team plans to work late to provide the Chief Executive Officer (CEO) with a
special report of sales before the quarter ends. After working for several hours, the team finds they
cannot save or print the reports.
Which of the following controls is preventing them from completing their work?
Which of the following provide the BEST protection against brute forcing stored passwords?
A security engineer is asked by the company’s development team to recommend the most secure
method for password storage.
Which of the following provide the BEST protection against brute forcing stored passwords?
(Select TWO).