which of the following types of policies?
The compliance team comes out with a new policy that all data stored on tapes over 3 years must
be degaussed. This BEST describes which of the following types of policies?
Which of the following does this procedure prevent?
Pete’s corporation has outsourced help desk services to a large provider. Management has
published a procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing
the technician to work on their PC. Which of the following does this procedure prevent?
Which of the following wireless attacks would this address?
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has
implemented a security control to limit the connecting MAC addresses to a single port. Which of
the following wireless attacks would this address?
Which of the following can be implemented with multiple bit strength?
Which of the following can be implemented with multiple bit strength?
Which of the following can she implement to prevent unauthorized users from connecting to the network?
Jane, the security administrator, is having issues with unauthorized users connecting to the
wireless network. For administrative reasons, she cannot implement any wireless encryption
methods. Which of the following can she implement to prevent unauthorized users from
connecting to the network?
Which of the following encryption methods offers the MOST security?
Matt, the security administrator, wants to secure the wireless network. Which of the following
encryption methods offers the MOST security?
Which of the following can she implement to accomplish this task?
Sara, the IT administrator, wants to control which devices can connect to the wireless network.
Which of the following can she implement to accomplish this task?
Which of the following would be the BEST reason for such a policy?
Pete, the system administrator, has instituted a policy banning personal digital music and video
players from the company premises. Which of the following would be the BEST reason for such a
policy?
which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?
Which of the following would BEST prevent this?
Pete, the system administrator, is concerned about unauthorized access at all entrances into the
building. PIN pad readers have been installed, but users have developed the habit of holding the
door for others behind them. Which of the following would BEST prevent this?