Which of the following security controls would be imple…
A system administrator needs to ensure that certain departments have more restrictive controls to their shared
folders than other departments. Which of the following security controls would be implemented to restrict those
departments?
Which of the following methods should the system admini…
A new intern was assigned to the system engineering department, which consists of the system architect and
system software developer’s teams. These two teams have separate privileges. The intern requires privileges
to view the system architectural drawings and comment on some software development projects. Which of the
following methods should the system administrator implement?
Which of the following would be the BEST way to manage …
A new network administrator is setting up a new file server for the company. Which of the following would be
the BEST way to manage folder security?
Which of the following is BEST suited when assigning us…
A network administrator is configuring access control for the sales department which has high employee
turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales
department?
which of the following is a security control that shoul…
Human Resources suspects an employee is accessing the employee salary database. The administrator is
asked to find out who it is. In order to complete this task, which of the following is a security control that should
be in place?
Which of the following should the security administrato…
Several employee accounts appear to have been cracked by an attacker. Which of the following should the
security administrator implement to mitigate password cracking attacks? (Choose two.)
Which of the following additional policies should be im…
A security administrator is reviewing the below output from a password auditing tool:
P@ss.
@pW1.
S3cU4Which of the following additional policies should be implemented based on the tool’s output?
Which of the following is an important implementation c…
Which of the following is an important implementation consideration when deploying a wireless network that
uses a shared password?
Which of the following would BEST prevent this behavior?
A system administrator has noticed that users change their password many times to cycle back to the original
password when their passwords expire. Which of the following would BEST prevent this behavior?
Which of the following, when used together, would BEST …
An administrator discovers that many users have used their same passwords for years even though the
network requires that the passwords be changed every six weeks. Which of the following, when used together,
would BEST prevent users from reusing their existing password? (Choose two.)