To initiate changes in teh process, the network adminis…
Based on a review of the existing access policies the network administrator determines that that changes are needed to meet current regulatory requirements of the
organization’s access control process. To initiate changes in teh process, the network administrator should FIRST:
The company has relocated to a:
An organization experienced a fire at its datacenter and was unable to operate at that location. The company moved to a location where HVAC and power are
available, but must supply and configure its own computing resources in order to provide services. The company has relocated to a:
Which of the following principles of authorization is b…
When implementing a new system, a systems administrator works with the information system owner to identify and document the responsibilities of various
positions within teh organization. Once responsibilities are identified, groups are created within the system to accommodate the various responsibilities of each
position type, with users being placed in these groups. Which of the following principles of authorization is being developed?
Which of the following should the software development …
A software development manager needs to create several different environments for application development, testing, and quality control. Controls are being put in
place to manage how software is moved into the production environment. Which of the following should the software development manager request be put in place
to implement the three new environments?
which of the following should be removed?
A company is hosting both sensitive and public information at a cloud provider. Prior to the company going out of business, the administrator will decommission all
virtual servers hosted in the cloud. When wiping the virtual hard drive, which of the following should be removed?
What is the reason for the accounting users suspicions?
Members of the accounting group save all of their work in a directory on a Linux server. The directory has the default permissions of rwxrwxr-x. The accounting
users suspect that a user in the Human Resources group is aware of the existence of a confidential file. What is the reason for the accounting users suspicions?
Which of the following will provide this information?
A penetration tester is attempting to determine the operating system of a remote host. Which of the following will provide this information?
Which of teh following is useful in this scenario?
A forensics investigator needs to be able to prove that digital evidence was not tampered with after being taken into custody. Which of teh following is useful in this
scenario?
Which of the following social engineering techniques BE…
Attackers use techniques when sending tailored emails to engage their targets and make them feel personally involved. Which of the following social engineering
techniques BEST describes this type of attack?
Which of the following are valid security concepts that…
A company is providing mobile devices to all its employees. The system administrator has been tasked with providing input for the company’s new mobile device
policy. Which of the following are valid security concepts that the system administrator should include when offering feedback to management? (Select TWO)