PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

what can the system administrator do to positively map …

Since the implementation of IPv6 on the company network, the security administrator has been unable to identify the users associated with certain devices utilizing
IPv6 addresses, even when the devices are centrally managed.
en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether f8:1e:af:ab:10:a3
inet6 fw80::fa1e:dfff:fee6:9d8%en1 prefixlen 64 scopeid 0x5
inet 192.168.1.14 netmask 0xffffff00 broadcast 192.168.1.255
inet6 2001:200:5:922:1035:dfff:fee6:9dfe prefixlen 64 autoconf
inet6 2001:200:5:922:10ab:5e21:aa9a:6393 prefixlen 64 autoconf temporary
nd6 options=1<PERFORMNUD>
media: autoselect
status: active
Given this output, which of the following protocols is in use by the company and what can the system administrator do to positively map users with IPv6 addresses
in the future? (Select TWO).

which of the following cases should the helpdesk staff …

The IT director has charged the company helpdesk with sanitizing fixed and removable media. The helpdesk manager has written a new procedure to be followed
by the helpdesk staff. This procedure includes the current standard to be used for data sanitization, as well as the location of physical degaussing tools. In which of
the following cases should the helpdesk staff use the new procedure? (Select THREE).

Which of the following remote access solutions has the …

A new IT company has hired a security consultant to implement a remote access system, which will enable employees to telecommute from home using both
company issued as well as personal computing devices, including mobile devices. The company wants a flexible system to provide confidentiality and integrity for
data in transit to the company’s internally developed application GUI. Company policy prohibits employees from having administrative rights to company issued
devices. Which of the following remote access solutions has the lowest technical complexity?

Which of the following tools, or outputs from the tools…

Company policy requires that all unsupported operating systems be removed from the network. The security administrator is using a combination of network based
tools to identify such systems for the purpose of disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be used to
help the security administrator make an approximate determination of the operating system in use on the local company network? (Select THREE).

Which of the following is a technical control that the …

A security administrator has noticed that an increased number of employees’ workstations are becoming infected with malware. The company deploys an
enterprise antivirus system as well as a web content filter, which blocks access to malicious web sites where malware files can be downloaded. Additionally, the
company implements technical measures to disable external storage. Which of the following is a technical control that the security administrator should implement
next to reduce malware infection?

Which of the following should the human resource direct…

A security auditor suspects two employees of having devised a scheme to steal money from the company. While one employee submits purchase orders for

personal items, the other employee approves these purchase orders. The auditor has contacted the human resources director with suggestions on how to detect
such illegal activities. Which of the following should the human resource director implement to identify the employees involved in these activities and reduce the risk
of this activity occurring in the future?

Which of the following should be the revised aggregate …

An IT auditor is reviewing the data classification for a sensitive system. The company has classified the data stored in the sensitive system according to the
following matrix:
DATA TYPECONFIDENTIALITYINTEGRITYAVAILABILITY

—————————————————————————————————————-
FinancialHIGHHIGHLOW
Client nameMEDIUMMEDIUMHIGH
Client addressLOWMEDIUMLOW
—————————————————————————————————————–
AGGREGATEMEDIUMMEDIUMMEDIUM
The auditor is advising the company to review the aggregate score and submit it to senior management. Which of the following should be the revised aggregate
score?

Which of the following is true about the security contr…

After reviewing a company’s NAS configuration and file system access logs, the auditor is advising the security administrator to implement additional security
controls on the NFS export. The security administrator decides to remove the no_root_squash directive from the export and add the nosuid directive. Which of the
following is true about the security controls implemented by the security administrator?


Page 450 of 4,924« First...102030...448449450451452...460470480...Last »