Which of the following controls support this goal?
After recovering from a data breach in which customer data was lost, the legal team meets
with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of
customer data. Which of the following controls support this goal?
Which of the following protocol would be MOST appropriate?
A security engineer, Joe, has been asked to create a secure connection between his mail
server and the mail server of a business partner. Which of the following protocol would be
MOST appropriate?
Which of the following would be the BEST way to manage folder security?
A new network administrator is setting up a new file server for the company. Which of the
following would be the BEST way to manage folder security?
Which of the following protocols should be used instead of Telnet?
A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the
following protocols should be used instead of Telnet?
which all of the employees’ devices are connected?
A network engineer is setting up a network for a company. There is a BYOD policy for the
employees so that they can connect their laptops and mobile devices. Which of the following
technologies should be employed to separate the administrative network from the network in
which all of the employees’ devices are connected?
Which of the following protocols is the BEST choice to use?
A network administrator is asked to send a large file containing PII to a business associate.
Which of the following protocols is the BEST choice to use?
Which of the following is the type of vulnerability described?
When performing the daily review of the system vulnerability scans of the network Joe, the
administrator, noticed several security related vulnerabilities with an assigned vulnerability
identification number. Joe researches the assigned vulnerability identification number from
the vendor website. Joe proceeds with applying the recommended solution for identified
vulnerability. Which of the following is the type of vulnerability described?
Which of the following describes this type of attack?
A malicious individual is attempting to write too much data to an application’s memory.
Which of the following describes this type of attack?
Which of the following would BEST fit her objective?
Ann, a security administrator, wishes to replace their RADIUS authentication with a more
secure protocol, which can utilize EAP. Which of the following would BEST fit her objective?
Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality
Ann, a security administrator, has concerns regarding her company’s wireless network. The
network is open and available for visiting prospective clients in the conference room, but she
notices that many more devices are connecting to the network than should be. Which of the
following would BEST alleviate Ann’s concerns with minimum disturbance of current
functionality for clients?