Which of the following is the risk calculation that the…
The Chief Information Officer (CIO) has asked a security analyst to determine the estimated costs associated
with each potential breach of their database that contains customer information. Which of the following is the
risk calculation that the CIO is asking for?
Which of the following are primary reasons to sign emai…
A company requires that all users enroll in the corporate PKI structure and digitally sign all emails. Which of the
following are primary reasons to sign emails with digital certificates? (Choose two.)
Which of the following is the MOST likely reason for he…
In order to enter a high-security data center, users are required to speak the correct password into a voice
recognition system. Ann, a member of the sales department, overhears the password and later speaks it into
the system. The system denies her entry and alerts the security team. Which of the following is the MOST likely
reason for her failure to enter the data center?
Which of the following would BEST prevent this from occ…
A malicious individual used an unattended customer service kiosk in a busy store to change the prices of
several products. The alteration was not noticed until several days later and resulted in the loss of several
thousand dollars for the store. Which of the following would BEST prevent this from occurring again?
Which of the following is the MOST likely cause?
An employee’s mobile device associates with the company’s guest WiFi SSID, but then is unable to retrieve
email. The email settings appear to be correct. Which of the following is the MOST likely cause?
Which of the following technologies is the MOST appropr…
A company needs to provide web-based access to shared data sets to mobile users, while maintaining a
standardized set of security controls. Which of the following technologies is the MOST appropriate storage?
Which of the following is MOST likely the cause for the…
A user attempts to install a new and relatively unknown software program recommended by a colleague. The
user is unable to install the program, dispute having successfully installed other programs previously. Which of
the following is MOST likely the cause for the user’s inability to complete the installation?
Which of the following should be used to automate this …
The security manager reports that the process of revoking certificates authority is too slow and should be
automated. Which of the following should be used to automate this process?
Which of the following would MOST likely help in achiev…
A system security analyst wants to capture data flowing in and out of the enterprise. Which of the following
would MOST likely help in achieving this goal?
Which of the following types of attacks is based on coo…
Which of the following types of attacks is based on coordinating small slices of a task across multiple systems?