Which of the following would be the BEST control to implement?
A company wants to prevent end users from plugging unapproved smartphones into PCs and
transferring data. Which of the following would be the BEST control to implement?
Which of the following authentication technique is MOST appropriate?
The ore-sales engineering team needs to quickly provide accurate and up-to-date information to
potential clients. This information includes design specifications and engineering data that is
developed and stored using numerous applications across the enterprise. Which of the following
authentication technique is MOST appropriate?
Which of the following protocols should be used for key exchange?
A network engineer is configuring a VPN tunnel connecting a company’s network to a business
partner. Which of the following protocols should be used for key exchange?
Which of the following types of cloud computing would be MOST appropriate if an organization required complete
Which of the following types of cloud computing would be MOST appropriate if an organization
required complete control of the environment?
Which of the following metrics is MOST important is this instance?
The database server used by the payroll system crashed at 3 PM and payroll is due at 5 PM.
Which of the following metrics is MOST important is this instance?
Which of the following is an attack designed to activate based on time?
Which of the following is an attack designed to activate based on time?
Which of the following should the engineer do to harden the network from this type of intrusion in the future?
A network security engineer notices unusual traffic on the network from a single IP attempting to
access systems on port 23. Port 23 is not used anywhere on the network. Which of the following
should the engineer do to harden the network from this type of intrusion in the future?
Which of the following documents outlines the responsibility of both participants in an agreement between two
Which of the following documents outlines the responsibility of both participants in an agreement
between two organizations?
Which of the following types of training would be the MOST appropriate for this department?
Users in the HR department were recently informed that they need to implement a user training
and awareness program which is tailored to their department. Which of the following types of
training would be the MOST appropriate for this department?
Which of the following incident response plan steps would MOST likely engaging business professionals with the
Which of the following incident response plan steps would MOST likely engaging business
professionals with the security team to discuss changes to existing procedures?