which of the following technologies?
An organization processes credit card transactions and is concerned that an employee may intentionally
email credit card numbers to external email addresses. This company should consider which of the
following technologies?
Which of the following, if properly implemented, would prevent users from accessing files that are unrelated t
Which of the following, if properly implemented, would prevent users from accessing files that are
unrelated to their job duties? (Select TWO).
Which of the following helps to establish an accurate timeline for a network intrusion?
Which of the following helps to establish an accurate timeline for a network intrusion?
Which of the following practices could be used to increase the security posture during deployment?
A recent audit has revealed weaknesses in the process of deploying new servers and network devices.
Which of the following practices could be used to increase the security posture during deployment?
(Select TWO).
Which of the following is the BEST management option for review of the new accounts?
Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable function
for the ABC Company without any supervision. Management has noticed several new accounts without
billing invoices that were paid. Which of the following is the BEST management option for review of the
new accounts?
Which of the following would meet all three goals?
A company hosts its public websites internally. The administrator would like to make some changes to the
architecture.
The three goals are:
reduce the number of public IP addresses in use by the web serversdrive all the web traffic through a central point of control
mitigate automated attacks that are based on IP address scanning
Which of the following would meet all three goals?
Which of the following policies is being enforced?
The IT department noticed that there was a significant decrease in network performance during the
afternoon hours. The IT department performed analysis of the network and discovered this was due to
users accessing and downloading music and video streaming from social sites. The IT department notified
corporate of their findings and a memo was sent to all employees addressing the misuse of company
resources and requesting adherence to company policy. Which of the following policies is being
enforced?
This is an example of:
A computer security officer has investigated a possible data breach and has found it credible. The officer
notifies the data center manager and the Chief Information Security Officer (CISO). This is an example of:
Which of the following would meet the requirements of this scenario?
A company would like to take electronic orders from a partner; however, they are concerned that a nonauthorized person may send an order. The legal department asks if there is a solution that provides nonrepudiation. Which of the following would meet the requirements of this scenario?
Which of the following is occurring?
The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler. Which of the
following is occurring?