Which of the following if implemented would violate company policy?
A company’s password and authentication policies prohibit the use of shared passwords and transitive
trust. Which of the following if implemented would violate company policy? (Select TWO)
Which of the following types of attacks is based on coordinating small slices of a task across multiple system
Which of the following types of attacks is based on coordinating small slices of a task across multiple
systems?
Which of the following would MOST likely help in achieving this goal?
A system security analyst wants to capture data flowing in and out of the enterprise. Which of the
following would MOST likely help in achieving this goal?
Which of the following should be used to automate this process?
The security manager reports that the process of revoking certificates authority is too slow and should be
automated. Which of the following should be used to automate this process?
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
A user attempts to install a new and relatively unknown software program recommended by a colleague.
The user is unable to install the program, dispute having successfully installed other programs previously.
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
Which of the following technologies is the MOST appropriate storage?
A company needs to provide web-based access to shared data sets to mobile users, while maintaining a
standardized set of security controls. Which of the following technologies is the MOST appropriate
storage?
Which of the following is the MOST likely cause?
An employee’s mobile device associates with the company’s guest WiFi SSID, but then is unable to
retrieve email. The email settings appear to be correct. Which of the following is the MOST likely cause?
Which of the following would BEST prevent this from occurring again?
A malicious individual used an unattended customer service kiosk in a busy store to change the prices of
several products. The alteration was not noticed until several days later and resulted in the loss of several
thousand dollars for the store. Which of the following would BEST prevent this from occurring again?
Which of the following is the MOST likely reason for her failure to enter the data center?
In order to enter a high-security data center, users are required to speak the correct password into a
voice recognition system. Ann, a member of the sales department, overhears the password and later
speaks it into the system. The system denies her entry and alerts the security team. Which of the
following is the MOST likely reason for her failure to enter the data center?
Which of the following are primary reasons to sign emails with digital certificates?
A company requires that all users enroll in the corporate PKI structure and digitally sign all emails. Which
of the following are primary reasons to sign emails with digital certificates? (Select TWO)