Which of the following should be used to prevent this from occurring again?
A company recently experienced data loss when a server crashed due to a midday power outage.
Which of the following should be used to prevent this from occurring again?
Which of the following can Matt implement to ensure servers will withstand hardware failure?
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no
budget to accomplish his task. Which of the following can Matt implement to ensure servers will
withstand hardware failure?
Which of the following solutions would mitigate this issue?
After a company has standardized to a single operating system, not all servers are immune to a wellknown OS vulnerability. Which of the following solutions would mitigate this issue?
which of the following security controls?
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The
manager is concerned with which of the following security controls?
Which of the following would provide the IT department with the BEST solution?
A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of
a busy shopping mall. The company has experienced several laptop thefts from the cafe during peak
shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate
laptop theft. Which of the following would provide the IT department with the BEST solution?
Which of the following controls would BEST address this security concern?
A business has set up a Customer Service kiosk within a shopping mall. The location will be staffed by an
employee using a laptop during the mall business hours, but there are still concerns regarding the
physical safety of the equipment while it is not in use. Which of the following controls would BEST
address this security concern?
Which of the following has been reported by the vulnerability scan?
Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent
penetration test reveals vulnerabilities on the network. Which of the following has been reported by the
vulnerability scan?
Which of the following documents outlines the technical and security requirements of an agreement between orga
Which of the following documents outlines the technical and security requirements of an agreement
between organizations?
Which of the following would be a customer concern if the offshore staff had direct access to their data?
A large bank has moved back office operations offshore to another country with lower wage costs in an
attempt to improve profit and productivity. Which of the following would be a customer concern if the
offshore staff had direct access to their data?
Which of the following are examples of detective controls?
Which of the following are examples of detective controls?