which of the following should be done at the beginning?
After a security incident involving a physical asset, which of the following should be done at the
beginning?
Which of the following BEST meets the requirements?
The chief Risk officer is concerned about the new employee BYOD device policy and has requested the
security department implement mobile security controls to protect corporate data in the event that a
device is lost or stolen. The level of protection must not be compromised even if the communication SIM
is removed from the device. Which of the following BEST meets the requirements? (Select TWO)
Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?
Which of the following technical controls helps to prevent Smartphones from connecting to a corporate
network?
Which of the following BEST meets this need?
Jane, an IT security technician, needs to create a way to secure company mobile devices. Which of the
following BEST meets this need?
which of the following?
Allowing unauthorized removable devices to connect to computers increases the risk of which of the
following?
which of the following?
The marketing department wants to distribute pens with embedded USB drives to clients. In the past this
client has been victimized by social engineering attacks which led to a loss of sensitive data. The security
administrator advises the marketing department not to distribute the USB pens due to which of the
following?
Which of the following mitigation techniques would address this concern?
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is
concerned that sensitive files can be copied to the USB drives. Which of the following mitigation
techniques would address this concern? (Select TWO).
Which of the following types of authentication is being utilized here?
A company has purchased an application that integrates into their enterprise user directory for account
authentication. Users are still prompted to type in their usernames and passwords. Which of the
following types of authentication is being utilized here?
Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home address
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the
house living room. Joe posts the picture on a popular social media site together with the message:
“Heading to our two weeks vacation to Italy.” Upon returning home, Joe discovers that the house was
burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew
Joe’s home address?
Which of the following would be MOST effective for preventing this behavior?
The call center supervisor has reported that many employees have been playing preinstalled games on
company computers and this is reducing productivity.
Which of the following would be MOST effective for preventing this behavior?
