Which of the following, if implemented, would BEST reassure the CSO?
A company is preparing to decommission an offline, non-networked root certificate server. Before
sending the server’s drives to be destroyed by a contracted company, the Chief Security Officer (CSO)
wants to be certain that the data will not be accessed. Which of the following, if implemented, would
BEST reassure the CSO? (Select TWO).
which of the following concepts?
Identifying residual risk is MOST important to which of the following concepts?
which of the following core security areas?
A software company has completed a security assessment. The assessment states that the company
should implement fencing and lighting around the property. Additionally, the assessment states that
production releases of their software should be digitally signed. Given the recommendations, the
company was deficient in which of the following core security areas? (Select TWO).
Which of the following defines a business goal for system restoration and acceptable data loss?
Which of the following defines a business goal for system restoration and acceptable data loss?
Drag and Drop the applicable controls to each asset type.
DRAG DROP
A Security administrator wants to implement strong security on the company smart phones and terminal
servers located in the data center. Drag and Drop the applicable controls to each asset type.Instructions: Controls can be used multiple times and not all placeholders needs to be filled. When you
have completed the simulation, Please select Done to submit.
Which of the following should Sara do to address the risk?
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years.
Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in
the system for $25,000. The breached system is scheduled to be replaced in five years.
Which of the following should Sara do to address the risk?
Which of the following concepts are included on the three sides of the "security triangle"?
Which of the following concepts are included on the three sides of the “security triangle”? (Select THREE).
which of the following data security concerns?
Elastic cloud computing environments often reuse the same physical hardware for multiple customers
over time as virtual machines are instantiated and deleted. This has important implications for which of
the following data security concerns?
Which of the following would be a possible solution to look into to ensure their application remains secure an
The system administrator notices that their application is no longer able to keep up with the large
amounts of traffic their server is receiving daily. Several packets are dropped and sometimes the server istaken offline. Which of the following would be a possible solution to look into to ensure their application
remains secure and available?
Which of the following poses the greatest risk with this integration?
Users can authenticate to a company’s web applications using their credentials from a popular social
media site. Which of the following poses the greatest risk with this integration?

