Which of the following should the administrator implement?
An administrator finds that non-production servers are being frequently compromised,
production servers are rebooting at unplanned times and kernel versions are several
releases behind the version with all current security fixes. Which of the following should the
administrator implement?
Which of the following would mitigate and secure the auditors finding?
An auditor’s report discovered several accounts with no activity for over 60 days. The
accounts were later identified as contractors’ accounts who would be returning in three
months and would need to resume the activities. Which of the following would mitigate and
secure the auditors finding?
Which of the following should be implemented in order to compliment password usage and smart cards?
Ann, the security administrator, wishes to implement multifactor security. Which of the
following should be implemented in order to compliment password usage and smart cards?
Which of the following methods should the company consider to secure this data in the future?
Customers’ credit card information was stolen from a popular video streaming company. A
security consultant determined that the information was stolen, while in transit, from the
gaming consoles of a particular vendor. Which of the following methods should the company
consider to secure this data in the future?
Which of the following methods should the system administrator implement?
A new intern was assigned to the system engineering department, which consists of the
system architect and system software developer’s teams. These two teams have separate
privileges. The intern requires privileges to view the system architectural drawings and
comment on some software development projects. Which of the following methods should
the system administrator implement?
which of the following?
One of the system administrators at a company is assigned to maintain a secure computer
lab. The administrator has rights to configure machines, install software, and perform user
account maintenance. However, the administrator cannot add new computers to the domain,
because that requires authorization from the Information Assurance Officer. This is an
example of which of the following?
Which of the following options would be the BEST solution at a minimal cost?
A small business needs to incorporate fault tolerance into their infrastructure to increase
data availability. Which of the following options would be the BEST solution at a minimal
cost?
Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL
server that is used by several employees. Which of the following is the BEST approach for
implementation of the new application on the virtual server?
Which of the following should Ann use in order to sign the file?
Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to
sign the file?
Which of the following protocols is used to validate whether trust is in place and accurate by returning respo
Which of the following protocols is used to validate whether trust is in place and accurate by
returning responses of either “good”, “unknown”, or “revoked”?