Which of the following would BEST alleviate her concerns?
Ann, a security administrator at a call center, has been experiencing problems with users intentionally
installing unapproved and occasionally malicious software on their computers. Due to the nature of their
jobs, Ann cannot change their permissions. Which of the following would BEST alleviate her concerns?
Which of the following should be used to authenticate and log connections from wireless users connecting with
Which of the following should be used to authenticate and log connections from wireless users
connecting with EAP-TLS?
Which of the following could prevent this scenario from occurring?
Ann has recently transferred from the payroll department to engineering. While browsing file shares, Ann
notices she can access the payroll status and pay rates of her new coworkers. Which of the following
could prevent this scenario from occurring?
Which of the following would meet the objectives of the security policy?
An organization’s security policy states that users must authenticate using something you do. Which of
the following would meet the objectives of the security policy?
Which of the following protocols is MOST likely to be leveraged by users who need additional information about
Which of the following protocols is MOST likely to be leveraged by users who need additional information
about another user?
Which of the following is a system that will support the requirement on its own?
The security manager wants to unify the storage of credential, phone numbers, office numbers, and
address information into one system. Which of the following is a system that will support the
requirement on its own?
Which of the following authentication services is the MOST likely using?
Joe, a network administrator, is able to manage the backup software console by using his network login
credentials. Which of the following authentication services is the MOST likely using?
Which of the following security controls is the BEST option to prevent auditors from accessing or modifying pa
An organization is implementing a password management application which requires that all local
administrator passwords be stored and automatically managed. Auditors will be responsible for
monitoring activities in the application by reviewing the logs. Which of the following security controls is
the BEST option to prevent auditors from accessing or modifying passwords in the application?
which of the following could be implemented without increasing the amount of space required at the entrance?
A security administrator is tackling issues related to authenticating users at a remote site. There have
been a large number of security incidents that resulted from either tailgating or impersonation of
authorized users with valid credentials. The security administrator has been told to implement multifactor
authentication in order to control facility access. To secure access to the remote facility, which of the
following could be implemented without increasing the amount of space required at the entrance?
Which of the following actions should the administrator take?
The security administrator notices a user logging into a corporate Unix server remotely as root. Which of
the following actions should the administrator take?