Which of the following can be used to maintain a higher…
Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults?
Which of the following techniques describes the use of …
Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised?
Which of the following describes the environment the ad…
An administrator is building a development environment and requests that three virtual servers are cloned and placed in a new virtual network isolated from the
production network. Which of the following describes the environment the administrator is building?
Which of the following should the administrator use to …
A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to
customer PCs.
Which of the following should the administrator use to test the patching process quickly and often?
Which of the following solutions provides the most flex…
Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?
Which of the following security techniques is MOST appr…
The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security
posture. Which of the following security techniques is MOST appropriate to do this?
Which of the following is the BEST approach for impleme…
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is used by several employees.
Which of the following is the BEST approach for implementation of the new application on the virtual server?
which of the following practices?
Identifying a list of all approved software on a system is a step in which of the following practices?
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the computer and finds that a service called Telnet is running and
connecting to an external website over port 443. This Telnet service was found by comparing the system’s services to the list of standard services on the
company’s system image. This review process depends on:
Which of the following would be the MOST appropriate?
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO).