Which of the following reviews should Jane conduct?
Pete, a developer, writes an application. Jane, the security analyst, knows some things
about the overall application but does not have all the details. Jane needs to review the
software before it is released to production. Which of the following reviews should Jane
conduct?
which of the following?
The information security team does a presentation on social media and advises the
participants not to provide too much personal information on social media web sites. This
advice would BEST protect people from which of the following?
Which of the following does this procedure prevent?
Pete’s corporation has outsourced help desk services to a large provider. Management has
published a procedure that requires all users, when receiving support, to call a special
number. Users then need to enter the code provided to them by the help desk technician
prior to allowing the technician to work on their PC. Which of the following does this
procedure prevent?
Which of the following wireless attacks would this address?
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has
implemented a security control to limit the connecting MAC addresses to a single port.
Which of the following wireless attacks would this address?
Which of the following can be implemented with multiple bit strength?
Which of the following can be implemented with multiple bit strength?
which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?
Which of the following would be Pete’s BEST option?
Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit
the downtime in the event of a disaster, but does not have the budget approval to implement
or maintain an offsite location that ensures 99.99% availability. Which of the following would
be Pete’s BEST option?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a
cipher which will encrypt 8 bits at a time before sending the data across the network. Which
of the following has Sara selected?
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
Which of the following is the BEST approach to perform risk mitigation of user access control
rights?
Which of the following devices is BEST suited for servers that need to store private keys?
Which of the following devices is BEST suited for servers that need to store private keys?