PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following controls should be implemented t…

During a recent audit, it was discovered that the employee who deploys patches also approves the patches. The audit found there is no documentation supporting
the patch management process, and there is no formal vetting of installed patches. Which of the following controls should be implemented to mitigate this risk?
(Select TWO).

Which of the following is the MOST important mitigation…

Multi-function devices are being deployed in various departments. All departments will be able to copy, print and scan to file. Some departments will be authorized
to use their devices to fax and email, while other departments will not be authorized to use those functions on their devices. Which of the following is the MOST
important mitigation technique to avoid an incident?

Which of the following represents an item the engineer …

The network engineer for an organization intends to use certificate-based 802.1X authentication on a network. The engineer’s organization has an existing PKI that
is used to issue server and user certificates. The PKI is currently not configured to support the issuance of 802.1X certificates. Which of the following represents an
item the engineer MUST configure?

Which of the following mitigations would be MOST approp…

A server administrator is investigating a breach and determines that an attacker modified the application log to obfuscate the attack vector. During the lessons
learned activity, the facilitator asks for a mitigation response to protect the integrity of the logs should a similar attack occur. Which of the following mitigations would
be MOST appropriate to fulfill the requirement?


Page 396 of 4,924« First...102030...394395396397398...410420430...Last »