PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following could BEST prevent this from occurring again?

During a routine audit it is discovered that someone has been using a state administrator account to log
into a seldom used server. The person used server. The person has been using the server to view
inappropriate websites that are prohibited to end users. Which of the following could BEST prevent this
from occurring again?

Which of the following controls can be implemented to prevent such unauthorized changes in the future?

The internal audit group discovered that unauthorized users are making unapproved changes to various
system configuration settings. This issue occurs when previously authorized users transfer from one
department to another and maintain the same credentials. Which of the following controls can be
implemented to prevent such unauthorized changes in the future?

Which of the following protocols should be used to this?

Joe, the chief technical officer (CTO) is concerned that the servers and network devices may not be able
to handle the growing needs of the company. He has asked his network engineer to being monitoring the
performance of these devices and present statistics to management for capacity planning. Which of the
following protocols should be used to this?

Which of the following device attributes was used to determine that the device was unauthorized?

A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the
corporate network. During a routine scan, the security administrator discovers an unauthorized device
belonging to a user in the marketing department. The user is using an android phone in order to browse
websites. Which of the following device attributes was used to determine that the device was
unauthorized?


Page 778 of 4,924« First...102030...776777778779780...790800810...Last »