Which of the following can be performed when an element…
Which of the following can be performed when an element of the company policy cannot be enforced by
technical means?
Which of the following PKI concepts is this describing?
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts
Organization C. Which of the following PKI concepts is this describing?
Which of the following would prevent a user from instal…
Which of the following would prevent a user from installing a program on a company-owned mobile device?
Which of the following would be MOST effective for prev…
The call center supervisor has reported that many employees have been playing preinstalled games on
company computers and this is reducing productivity.
Which of the following would be MOST effective for preventing this behavior?
Which of the following is the MOST likely reason the ho…
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house
living room. Joe posts the picture on a popular social media site together with the message: “Heading to our
two weeks’ vacation to Italy.” Upon returning home, Joe discovers that the house was burglarized.
Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home
address?
Which of the following types of authentication is being…
A company has purchased an application that integrates into their enterprise user directory for account
authentication. Users are still prompted to type in their usernames and passwords. Which of the following types
of authentication is being utilized here?
Which of the following mitigation techniques would addr…
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned
that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address
this concern? (Choose two.)
The security administrator advises the marketing depart…
The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client
has been victimized by social engineering attacks which led to a loss of sensitive data.
The security administrator advises the marketing department not to distribute the USB pens due to the
following:
Allowing unauthorized removable devices to connect to c…
Allowing unauthorized removable devices to connect to computers increases the risk of the following:
Which of the following BEST meets this need?
Jane, an IT security technician, needs to create a way to secure company mobile devices. Which of the
following BEST meets this need?