Which of the following BEST meets their goal?
A company is trying to implement physical deterrent controls to improve the overall security
posture of their data center. Which of the following BEST meets their goal?
Which of the following controls could they implement to BEST meet this goal?
A company’s employees were victims of a spear phishing campaign impersonating the CEO.
The company would now like to implement a solution to improve the overall security posture
by assuring their employees that email originated from the CEO. Which of the following
controls could they implement to BEST meet this goal?
Which of the following actions would BEST accomplish this goal?
A security technician is attempting to improve the overall security posture of an internal mail
server. Which of the following actions would BEST accomplish this goal?
Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost o
A bank has recently deployed mobile tablets to all loan officers for use at customer sites.
Which of the following would BEST prevent the disclosure of customer data in the event that
a tablet is lost or stolen?
Which of the following is the primary security concern when deploying a mobile device on a network?
Which of the following is the primary security concern when deploying a mobile device on a
network?
which applications a user can install and run on a company issued mobile device?
Which of the following technical controls is BEST used to define which applications a user
can install and run on a company issued mobile device?
Which of the following solutions would mitigate this issue?
After a company has standardized to a single operating system, not all servers are immune
to a well-known OS vulnerability. Which of the following solutions would mitigate this issue?
Which of the following security goals is met by camouflaging data inside of other files?
A security administrator discovers an image file that has several plain text documents hidden
in the file. Which of the following security goals is met by camouflaging data inside of other
files?
Which of the following provides the highest degree of protection from unauthorized wired network access?
A company determines a need for additional protection from rogue devices plugging into
physical ports around the building. Which of the following provides the highest degree of
protection from unauthorized wired network access?
Which of the following, if implemented, would BEST reassure the CSO?
A company is preparing to decommission an offline, non-networked root certificate server.
Before sending the server’s drives to be destroyed by a contracted company, the Chief
Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the
following, if implemented, would BEST reassure the CSO? (Select TWO).