Which of the following types of security controls are v…
Which of the following types of security controls are visible security cameras considered to be?
Which of the following BEST prevents this situation fro…
Several employees clicked on a link in a malicious message that bypassed the spam filter and their PCs were
infected with malware as a result. Which of the following BEST prevents this situation from occurring in the
future?
Which of the following describes this type of data?
A security administrator is auditing a database server to ensure the correct security measures are in place to
protect the data. Some of the fields consist of people’s first name, last name, home address, date of birth and
mothers last name. Which of the following describes this type of data?
Which of the following is occurring?
The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler. Which of the
following is occurring?
Which of the following would meet the requirements of t…
A company would like to take electronic orders from a partner; however, they are concerned that a non-authorized person may send an order. The legal department asks if there is a solution that provides nonrepudiation. Which of the following would meet the requirements of this scenario?
This is an example of:
A computer security officer has investigated a possible data breach and has found it credible. The officer
notifies the data center manager and the Chief Information Security Officer (CISO). This is an example of:
Which of the following policies is being enforced?
The IT department noticed that there was a significant decrease in network performance during the afternoon
hours. The IT department performed analysis of the network and discovered this was due to users accessing
and downloading music and video streaming from social sites. The IT department notified corporate of their
findings and a memo was sent to all employees addressing the misuse of company resources and requesting
adherence to company policy. Which of the following policies is being enforced?
Which of the following would meet all three goals?
A company hosts its public websites internally. The administrator would like to make some changes to the
architecture.
The three goals are:
1. reduce the number of public IP addresses in use by the web servers
2. drive all the web traffic through a central point of control
3. mitigate automated attacks that are based on IP address scanning
Which of the following would meet all three goals?
Which of the following is the BEST management option fo…
Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable function for
the ABC Company without any supervision. Management has noticed several new accounts without billing
invoices that were paid. Which of the following is the BEST management option for review of the new
accounts?
Which of the following practices could be used to incre…
A recent audit has revealed weaknesses in the process of deploying new servers and network devices. Which
of the following practices could be used to increase the security posture during deployment? (Choose two.)