Which of the following BEST protects the master password list?
A team of firewall administrators have access to a `master password list’ containing service account
passwords. Which of the following BEST protects the master password list?
Which of the following would BEST address the administrator’s concerns?
A security administrator has concerns regarding employees saving data on company provided mobile
devices. Which of the following would BEST address the administrator’s concerns?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile dev
Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile
device theft?
Which of the following describes how this private key should be stored so that it is protected from theft?
An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of
the following describes how this private key should be stored so that it is protected from theft?
Which of the following has a storage root key?
Which of the following has a storage root key?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following would be used when a higher level of security is desired for encryption key
storage?
Which of the following is a hardware based encryption device?
Which of the following is a hardware based encryption device?
Which of the following would ensure some type of encryption is performed while data is in transit?
A company wants to ensure that all aspects if data are protected when sending to other sites within the
enterprise. Which of the following would ensure some type of encryption is performed while data is in
transit?