Which of the following should Sara do to address the risk?
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years.
Each breach has cost the company $3,000. A third party vendor has offered to repair the security
hole in the system for $25,000. The breached system is scheduled to be replaced in five years.
Which of the following should Sara do to address the risk?
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and
Which of the following is an authentication and accounting service that uses TCP for connecting to
routers and switches?
Which of the following methods should the system administrator implement?
A new intern was assigned to the system engineering department, which consists of the system
architect and system software developer’s teams. These two teams have separate privileges. The
intern requires privileges to view the system architectural drawings and comment on some
software development projects. Which of the following methods should the system administrator
implement?
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on
a production system?
Which of the following would be an appropriate mitigation technique?
A system security analyst using an enterprise monitoring tool notices an unknown internal host
exfiltrating files to several foreign IP addresses. Which of the following would be an appropriate
mitigation technique?
Which of the following mitigation methods would provide the MOST physical protection?
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation
methods would provide the MOST physical protection?
which of the following?
One of the system administrators at a company is assigned to maintain a secure computer lab.
The administrator has rights to configure machines, install software, and perform user account
maintenance. However, the administrator cannot add new computers to the domain, because that
requires authorization from the Information Assurance Officer. This is an example of which of the
following?
Which of the following should be connected to the fire alarm system in order to help prevent the spread of a f
Which of the following should be connected to the fire alarm system in order to help prevent the
spread of a fire in a server room without data loss to assist in an FM-200 deployment?
Which of the following can Matt implement to ensure servers will withstand hardware failure?
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been
given no budget to accomplish his task. Which of the following can Matt implement to ensure
servers will withstand hardware failure?
Which of the following fire suppression systems is MOST likely used in a datacenter?
Which of the following fire suppression systems is MOST likely used in a datacenter?