Which of the following describes this type of data?
A security administrator is auditing a database server to ensure the correct security measures are in place
to protect the data. Some of the fields consist of people’s first name, last name, home address, date of
birth and mothers last name. Which of the following describes this type of data?
Which of the following BEST prevents this situation from occurring in the future?
Several employees clicked on a link in a malicious message that bypassed the spam filter and their PCs
were infected with malware as a result. Which of the following BEST prevents this situation from
occurring in the future?
which of the following types of security controls?
Visible security cameras are considered to be which of the following types of security controls?
Which of the following security controls BEST accomplishes this goal?
A security administrator would like to ensure that system administrators are not using the same password
for both their privileged and non-privileged accounts. Which of the following security controls BEST
accomplishes this goal?
Which of the following could Ann implement to help identify accounts that are still active for terminated empl
Ann, a security analyst, has discovered that her company has very high staff turnover and often user
accounts are not disabled after an employee leaves the company. Which of the following could Ann
implement to help identify accounts that are still active for terminated employees?
Which of the following BEST describes the type of system Ann is installing?
Ann, the system administrator, is installing an extremely critical system that can support ZERO downtime.
Which of the following BEST describes the type of system Ann is installing?
Which of the following should the engineer choose to meet these requirements?
A systems engineer has been presented with storage performance and redundancy requirements for a
new system to be built for the company. The storage solution must be designed to support the highest
performance and must also be able to support more than one drive failure. Which of the following should
the engineer choose to meet these requirements?
Which of the following is MOST important to the security manager?
In order to secure additional budget, a security manager wants to quantify the financial impact of a onetime compromise. Which of the following is MOST important to the security manager?
Which of the following can be used to ensure the integrity of the logs after they are collected?
A company has just deployed a centralized event log storage system. Which of the following can be used
to ensure the integrity of the logs after they are collected?
Which of the following choices BEST mitigates the range of risks associated with the continued use of removabl
Several departments in a corporation have a critical need for routinely moving data from one system to
another using removable storage devices. Senior management is concerned with data loss and the
introduction of malware on the network. Which of the following choices BEST mitigates the range of risks
associated with the continued use of removable storage devices?
