PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following ciphers should be chosen?

a company is deploying an new video conferencing system to be used by the executive team for board meetings. The security engineer has been asked to choose
the strongest available asymmetric cipher to be used for encryption of board papers, and chose the strongest available stream cipher to be configured for video
streaming. Which of the following ciphers should be chosen? (Select two)

Which of the following most likely happened?

Client computers login at specified times to check and update antivirus definitions using a dedicated account configured by the administrator. One day the clients
are unable to login with the account, but the server still responds to ping requests. The administrator has not made any changed. Which of the following most likely
happened?

Which of the following reasons could have caused this p…

A switch is set up to allow only 2 simultaneous MAC addresses per switch port. An administrator is reviewing a log and determines that a switch port has been
deactivated in a conference room after it detected 3 or more MAC addresses on the same port. Which of the following reasons could have caused this port to be
disabled?

Which of the following would be the best choice to impl…

During a recent audit, the auditors cited the company’s current virtual machine infrastructure as a concern. The auditors cited the fact that servers containing
sensitive customer information reside on the same physical host as numerous virtual machines that follow less stringent security guild lines. Which of the following
would be the best choice to implement to address this audit concern while maintain the current infrastructure?

Which of the following forms of risk mitigation has the…

A risk management team indicated an elevated level of risk due to the location of a corporate datacenter in a region with an unstable political climate. The chief
information officer (CIO) accepts the recommendation to transition the workload to an alternate datacenter in a more stable region. Which of the following forms of
risk mitigation has the CIO elected to pursue?

Which of the following identifies a possible next step …

A user has called the help desk to report an enterprise mobile device was stolen. The technician receiving the call accesses the MDM administration portal to
identify the device’s last known geographic location. The technician determines the device is still communicating with the MDM. After taking note of the last known
location, the administrator continues to follow the rest of the checklist. Which of the following identifies a possible next step for the administrator?


Page 438 of 4,924« First...102030...436437438439440...450460470...Last »