Which of the following are Data Loss Prevention (DLP) s…
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues? (Choose
two.)
Which of the following controls would prevent an employ…
Which of the following controls would prevent an employee from emailing unencrypted information to their
personal email account over the corporate network?
Which of the following controls could be utilized to mi…
An employee recently lost a USB drive containing confidential customer data. Which of the following controls
could be utilized to minimize the risk involved with the use of USB drives?
how should Matt meet this requirement?
Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company
data. Where and how should Matt meet this requirement?
Which of the following security strategies allows a com…
Which of the following security strategies allows a company to limit damage to internal systems and provides
loss control?
Which of the following would be the BEST control to imp…
Several employees have been printing files that include personally identifiable information of customers.
Auditors have raised concerns about the destruction of these hard copies after they are created, and
management has decided the best way to address this concern is by preventing these files from being printed.
Which of the following would be the BEST control to implement?
Which of the following would be the BEST technology con…
A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents.
Which of the following would be the BEST technology control to use in this scenario?
Encryption of data at rest is important for sensitive i…
Encryption of data at rest is important for sensitive information because of the following:
Which of the following security account management tech…
Which of the following security account management techniques should a security analyst implement to prevent
staff, who has switched company roles, from exceeding privileges?
Which of the following risk mitigation strategies is MO…
The system administrator has deployed updated security controls for the network to limit risk of attack. The
security manager is concerned that controls continue to function as intended to maintain appropriate security
posture.
Which of the following risk mitigation strategies is MOST important to the security manager?