Which of the following is the GREATEST security risk of two or more companies working together under a Memoran
Which of the following is the GREATEST security risk of two or more companies working together under a
Memorandum of Understanding?
Which of the following describes the purpose of an MOU?
Which of the following describes the purpose of an MOU?
Which of the following types of interoperability agreement is this?
A company has decided to move large data sets to a cloud provider in order to limit the costs of new
infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make sure both
parties have a clear understanding of the controls needed to protect the data.
Which of the following types of interoperability agreement is this?
Which of the following is the primary security concern when deploying a mobile device on a network?
Which of the following is the primary security concern when deploying a mobile device on a network?
Which of the following should the security administrator do in regards to the application?
A security administrator plans on replacing a critical business application in five years. Recently, there was
a security flaw discovered in the application that will cause the IT department to manually re-enable user
accounts each month at a cost of $2,000. Patching the application today would cost $140,000 and take
two months to implement. Which of the following should the security administrator do in regards to the
application?
Which of the following MUST be considered prior to sending data to a third party?
Acme Corp has selectively outsourced proprietary business processes to ABC Services. Due to some
technical issues, ABC services wants to send some of Acme Corp’s debug data to a third party vendor for
problem resolution. Which of the following MUST be considered prior to sending data to a third party?
Which of the following strategies would the administrator MOST likely implement?
An administrator wants to minimize the amount of time needed to perform backups during the week. It is
also acceptable to the administrator for restoration to take an extended time frame.
Which of the following strategies would the administrator MOST likely implement?
Which of the following MUST be done before any actual switch configuration is performed?
A security administrator needs to update the OS on all the switches in the company. Which of the
following MUST be done before any actual switch configuration is performed?
Which of the following strategies would BEST mitigate this risk?
Developers currently have access to update production servers without going through an approval
process. Which of the following strategies would BEST mitigate this risk?
Which of the following mitigation strategies is established to reduce risk when performing updates to business
Which of the following mitigation strategies is established to reduce risk when performing updates to
business critical systems?
