Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?
Which of the following technical controls helps to prevent Smartphones from connecting to a
corporate network?
Which of the following BEST meets the requirements?
The Chief Risk Officer is concerned about the new employee BYOD device policy and has
requested the security department implement mobile security controls to protect corporate data in
the event that a device is lost or stolen. The level of protection must not be compromised even if
the communication SIM is removed from the device. Which of the following BEST meets the
requirements? (Select TWO).
A way to assure data at-rest is secure even in the event of loss or theft is to use:
A way to assure data at-rest is secure even in the event of loss or theft is to use:
Which of the following would prevent a user from installing a program on a company-owned mobile device?
Which of the following would prevent a user from installing a program on a company-owned
mobile device?
Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mi
Which of the following can be used to maintain a higher level of security in a SAN by allowing
isolation of mis-configurations or faults?
The act of magnetically erasing all of the data on a disk is known as:
The act of magnetically erasing all of the data on a disk is known as:
which of the following?
LDAP and Kerberos are commonly used for which of the following?
Which of the following practices could be used to increase the security posture during deployment?
A recent audit has revealed weaknesses in the process of deploying new servers and network
devices. Which of the following practices could be used to increase the security posture during
deployment? (Select TWO).
Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?
Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the
company’s financial records. Which of the following security mechanism would be MOST
appropriate to confirm Joe’s suspicion?
Which of the following would BEST fit her objective?
Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure
protocol, which can utilize EAP. Which of the following would BEST fit her objective?