Which of the following is the BEST approach to implement this process?
A small company has a website that provides online customer support. The company requires an
account recovery process so that customers who forget their passwords can regain access. Which
of the following is the BEST approach to implement this process?
which will improve in-transit protection of transactional data?
A bank has a fleet of aging payment terminals used by merchants for transactional processing.
The terminals currently support single DES but require an upgrade in order to be compliant with
security standards. Which of the following is likely to be the simplest upgrade to the aging
terminals which will improve in-transit protection of transactional data?
Which of the following should be applied in order to achieve confidentiality and integrity of all data across
A new MPLS network link has been established between a company and its business partner. The
link provides logical isolation in order to prevent access from other business partners. Which of the
following should be applied in order to achieve confidentiality and integrity of all data across the
link?
Which of the following authentication services should be replaced with a more secure alternative?
Which of the following authentication services should be replaced with a more secure alternative?
Which of the following activities should be performed by the IT security staff member prior to establishing th
A financial company requires a new private network link with a business partner to cater for realtime and batched data flows. Which of the following activities should be performed by the IT
security staff member prior to establishing the link?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login
process. Which of the following BEST describes the email address?
Which of the following is designed to ensure high availability of web based applications?
Which of the following is designed to ensure high availability of web based applications?
Which of the following would be MOST effective in reducing data leaks in this situation?
After a number of highly publicized and embarrassing customer data leaks as a result of social
engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will
reduce the risk of another data leak. Which of the following would be MOST effective in reducing
data leaks in this situation?
Which of the following provides the BEST level of security training for the executives?
Human Resources (HR) would like executives to undergo only two specific security training
programs a year. Which of the following provides the BEST level of security training for the
executives? (Select TWO).
Which of the following provides data the best fault tolerance at the LOWEST cost?
Which of the following provides data the best fault tolerance at the LOWEST cost?