PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following would eliminate Ann’s excuse in …

Several customers received an email from an employee that advertised better rates at a different company. Shortly after the email was sent, Ann, the employee
who sent the email, resigned and joined the other company. When confronted, Ann claimed that she did not send the email, it was another person spoofing her
email address. Which of the following would eliminate Ann’s excuse in the future?

Which of the following BEST identifies the stage of inc…

A company was recently the victim of a major attack which resulted in significant reputational loss. Joe a member of the company incident response team is
currently reviewing Standard Operating Procedures for the team in the wake of the attack. Which of the following BEST identifies the stage of incident response that
Joe is in?

Which of the following would be the MOST efficient meth…

A systems administrator is working with a third party to establish the automated transfer of large amounts of proprietary data. The interface will need to use secured
credentials and the transmission will consist of data that has been encrypted prior to transit and needs no additional protection. Which of the following would be the
MOST efficient method of data transmission given the established requirements?

Which of the following can the employee perform if the …

A company has hired a an ex-employee to perform a penetration test of the company’s proprietary application. Although the ex-employee used to be part of the
development team, the application has gone through some changes since the employee left. Which of the following can the employee perform if the company is not
willing to release any information to the ex-employee?

Which of the following can be used to standardize and e…

During a recent vulnerability assessment the penetration testers were able to successfully crack a large number of employee passwords. The company technology
use agreement clearly states that passwords used on the company network must be at least eight characters long and contain at least one uppercase letter and
special character. Which of the following can be used to standardize and enforce the password complexity rules across the entire organization to resolve the issue?

Which of the following actions is appropriate for the website administrator to…

A high traffic website is experiencing numerous brute force attacks against its user base. The attackers are using a very large botnet to carry out the attack. As a
result, many users passwords are being compromised Which of the following actions is appropriate for the website administrator to take in order to reduce the
threat from this type of attack in the future. .


Page 409 of 4,924« First...102030...407408409410411...420430440...Last »