PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following solutions is most appropriate fo…

A security analyst is working on a project team responsible for the integration of an enterprise SSO solution. The SSO solution requires the use of an open standard
for the exchange of authentication and authorization across numerous web based applications. Which of the following solutions is most appropriate for the analyst

to recommend in this scenario?

Which of the following lists is the BEST combination of…

A small IT security form has an internal network composed of laptops, servers, and printers. The network has both wired and wireless segments and supports VPN
access from remote sites. To protect the network from internal and external threats, including social engineering attacks, the company decides to implement
stringent security controls. Which of the following lists is the BEST combination of security controls to implement?

Which of the following types of malware MOST likely cau…

An employee reports work was being completed on a company owned laptop using a public wireless hot-spot. A pop-up screen appeared and the user closed the
pop-up. Seconds later the desktop background was changed to the image of a padlock with a message demanding immediate payment to recover the data. Which
of the following types of malware MOST likely caused this issue?

Which of the following ports should be opened on the fi…

An organization currently uses FTP for the transfer of large files, due to recent security enhancements, is now required to use a secure method of file transfer and is
testing both SFTP and FTPS as alternatives. Which of the following ports should be opened on the firewall in order to test the two alternatives? (Select Two)

Which of the following can she implement to BEST mitiga…

Ann, a security administrator is hardening the user password policies. She currently has the following in place.
Passwords expire every 60 days
Password length is at least eight characters
Passwords must contain at least one capital letter and one numeric character Passwords cannot be reused until the password has been changed eight times She
learns that several employees are still using their original password after the 60-day forced change. Which of the following can she implement to BEST mitigate
this?


Page 439 of 4,924« First...102030...437438439440441...450460470...Last »