Which of the following concerns should Jane, the IT security manager, ensure are under control?
Corporate IM presents multiple concerns to enterprise IT. Which of the following concerns should
Jane, the IT security manager, ensure are under control? (Select THREE).
Which of the following controls would prevent an employee from emailing unencrypted information to their perso
Which of the following controls would prevent an employee from emailing unencrypted information
to their personal email account over the corporate network?
which rates the ability of a system to correctly authenticate an authorized user?
Which of the following is a measure of biometrics performance which rates the ability of a system
to correctly authenticate an authorized user?
The use of social networking sites introduces the risk of:
The use of social networking sites introduces the risk of:
How many authentication factors are in use by the VPN system?
A company with a US-based sales force has requested that the VPN system be configured to
authenticate the sales team based on their username, password and a client side certificate.
Additionally, the security administrator has restricted the VPN to only allow authentication from the
US territory. How many authentication factors are in use by the VPN system?
which of the following attacks?
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the
following attacks? (Select TWO).
Which of the following should the company implement to enforce software digital rights?
A software development company wants to implement a digital rights management solution to
protect its intellectual property. Which of the following should the company implement to enforce
software digital rights?
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network b
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company
network by using a former employee’s credential?
Which of the following can be inferred of a firewall that is configured ONLY with the following ACL?
Users are unable to connect to the web server at IP 192.168.0.20. Which of the following can be
inferred of a firewall that is configured ONLY with the following ACL?
PERMIT TCP ANY HOST 192.168.0.10 EQ 80
PERMIT TCP ANY HOST 192.168.0.10 EQ 443
Which of the following security awareness training is BEST suited for data owners who are concerned with prote
Which of the following security awareness training is BEST suited for data owners who are
concerned with protecting the confidentiality of their data?