PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following should the project manager relea…

A project manager working for a large city government is required to plan and build a WAN, which will be required to host official business and public access. It is
also anticipated that the city’s emergency and first response communication systems will be required to operate across the same network. The project manager has
experience with enterprise IT projects, but feels this project has an increased complexity as a result of the mixed business / public use and the critical

infrastructure it will provide. Which of the following should the project manager release to the public, academia, and private industry to ensure the city provides due
care in considering all project factors prior to building its new WAN?

Which of the following actions should be taken by the s…

ODBC access to a database on a network-connected host is required. The host does not have a security mechanism to authenticate the incoming ODBC
connection, and the application requires that the connection have read/write permissions. In order to further secure the data, a nonstandard configuration would
need to be implemented. The information in the database is not sensitive, but was not readily accessible prior to the implementation of the ODBC connection.
Which of the following actions should be taken by the security analyst?

Which of the following compensating controls should be …

A critical system audit shows that the payroll system is not meeting security policy due to missing
OS security patches. Upon further review, it appears that the system is not being patched at all. The vendor states that the system is only supported on the current
OS patch level. Which of the following compensating controls should be used to mitigate the vulnerability of missing OS patches on this system?

Which of the following is the solutions architect MOST …

A security solutions architect has argued consistently to implement the most secure method of encrypting corporate messages. The solution has been derided as
not being cost effective by other members of the IT department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to
unauthorized decryption. The method also requires special handling and security for all key material that goes above and beyond most encryption systems.
Which of the following is the solutions architect MOST likely trying to implement?

Which of the following is the ALE?

The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during
the year. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and, based on industry data, the exposure factor to fires
is only 20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE?


Page 447 of 4,924« First...102030...445446447448449...460470480...Last »