PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following would be the best choice to impl…

A company recently experienced several security breaches that resulted in confidential data being infiltrated
form the network. The forensic investigation revealed that the data breaches were caused by an insider
accessing files that resided in shared folders who then encrypted the data and sent it to contacts via third party
email. Management is concerned that other employees may also be sending confidential files outside of the
company to the same organization. Management has requested that the IT department implement a solution
that will allow them to:
Track access and sue of files marked confidential, provide documentation that can be sued for investigations,
prevent employees from sending confidential data via secure third party email, identify other employees that
may be involved in these activities.
Which of the following would be the best choice to implement to meet the above requirements?

Which of the following will allow Joe to configure a ce…

Joe, a security technician, is configuring two new firewalls through the web on each. Each time Joe connects,
there is a warning message in the browser window about the certificate being untrusted. Which of the following
will allow Joe to configure a certificate for the firewall so that firewall administrators are able to connect both
firewalls without experiencing the warning message?


Page 33 of 4,924« First...1020...3132333435...405060...Last »