Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device i
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if
the device is stolen? (Select TWO).
Which of the following should the security administrator implement to mitigate password cracking attacks?
Several employee accounts appear to have been cracked by an attacker. Which of the following
should the security administrator implement to mitigate password cracking attacks? (Select TWO).
Which of the following is being implemented by Jane’s company?
Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses
to gather data on new malware. Which of the following is being implemented by Jane’s company?
which of the following is a security control that should be in place?
Human Resources suspects an employee is accessing the employee salary database. The
administrator is asked to find out who it is. In order to complete this task, which of the following is a
security control that should be in place?
Which of the following should Pete, a security manager, implement to reduce the risk of employees working in c
Which of the following should Pete, a security manager, implement to reduce the risk of
employees working in collusion to embezzle funds from their company?
Which of the following would provide the IT department with the BEST solution?
A cafe provides laptops for Internet access to their customers. The cafe is located in the center
corridor of a busy shopping mall. The company has experienced several laptop thefts from the
cafe during peek shopping hours of the day. Corporate has asked that the IT department provide a
solution to eliminate laptop theft. Which of the following would provide the IT department with the
BEST solution?
Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking
Which of the following will allow Pete, a security analyst, to trigger a security alert because of a
tracking cookie?
Which of the following protocols allows for secure transfer of files?
Which of the following protocols allows for secure transfer of files? (Select TWO).
Which of the following would mitigate and secure the auditors finding?
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts
were later identified as contractors’ accounts who would be returning in three months and would
need to resume the activities. Which of the following would mitigate and secure the auditors
finding?
Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?