Which of the following can be used as an equipment theft deterrent?
Which of the following can be used as an equipment theft deterrent?
Which of the following would be the MOST appropriate?
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the
following would be the MOST appropriate? (Select TWO).
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the computer
and finds that a service called Telnet is running and connecting to an external website over port 443. This
Telnet service was found by comparing the system’s services to the list of standard services on the
company’s system image. This review process depends on:
which of the following practices?
Identifying a list of all approved software on a system is a step in which of the following practices?
Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is
used by several employees.
Which of the following is the BEST approach for implementation of the new application on the virtual
server?
Which of the following security techniques is MOST appropriate to do this?
The information security technician wants to ensure security controls are deployed and functioning as
intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?
Which of the following solutions provides the most flexibility when testing new security controls prior to imp
Which of the following solutions provides the most flexibility when testing new security controls prior to
implementation?
Which of the following should the administrator use to test the patching process quickly and often?
A company is about to release a very large patch to its customers. An administrator is required to test
patch installations several times prior to distributing them to customer PCs.
Which of the following should the administrator use to test the patching process quickly and often?
Which of the following describes the environment the administrator is building?
An administrator is building a development environment and requests that three virtual servers are
cloned and placed in a new virtual network isolated from the production network. Which of the following
describes the environment the administrator is building?
Which of the following techniques describes the use of application isolation during execution to prevent syste
Which of the following techniques describes the use of application isolation during execution to prevent
system compromise if the application is compromised?
