Which of the following can be used to mitigate risk if …
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following would BEST address the administr…
A security administrator has concerns regarding employees saving data on company provided mobile devices.
Which of the following would BEST address the administrator’s concerns?
Which of the following BEST protects the master passwor…
A team of firewall administrators have access to a `master password list’ containing service account
passwords. Which of the following BEST protects the master password list?
which already deploys full disk encryption?
Which of the following is an advantage of implementing individual file encryption on a hard drive which already
deploys full disk encryption?
Which of the following explains the reason for the incr…
A database administrator would like to start encrypting database exports stored on the SAN, but the storage
administrator warns that this may drastically increase the amount of disk space used by the exports. Which of
the following explains the reason for the increase in disk space usage?
Which of the following types of data encryption would M…
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific
table?
Which of the following BEST protects the credit card data?
A merchant acquirer has the need to store credit card numbers in a transactional database in a high
performance environment. Which of the following BEST protects the credit card data?
To protect corporate data on removable media, a securit…
To protect corporate data on removable media, a security policy should mandate that all removable devices use
the following:
Which of the following is the BEST method for ensuring …
Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate
laptops where the file structures are unknown?
Full disk encryption is MOST effective against the foll…
Full disk encryption is MOST effective against the following threats: