Which of the following is used to inform users of the repercussions of releasing proprietary information?
Which of the following is used to inform users of the repercussions of releasing proprietary
information?
Which of the following will alert the security team when elevated access is applied?
A review of administrative access has discovered that too many accounts have been granted
administrative rights. Which of the following will alert the security team when elevated access is
applied?
This is known as a:
When an authorized application is installed on a server, the application triggers an alert on the
HIDS. This is known as a:
which of the following scenarios would it be preferable to implement file level encryption instead of whole di
In which of the following scenarios would it be preferable to implement file level encryption instead
of whole disk encryption?
which of the following would be MOST appropriate for fault tolerance?
For high availability which of the following would be MOST appropriate for fault tolerance?
which of the following should the sender use to digitally sign a document?
When implementing a Public Key Infrastructure, which of the following should the sender use to
digitally sign a document?
which of the following solutions would work BEST?
A military base wants to incorporate biometrics into its new security measures, but the head of
security does not want them to be the sole method of authentication. For unmanned entry points,
which of the following solutions would work BEST?
Which of the following can be used to do this without using certificates?
Ann a security administrator wants a limit access to the wireless network. Which of the following
can be used to do this without using certificates?
Which of the following should the user do to enforce full device confidentiality should the phone be lost or s
A user has an Android smartphone that supports full device encryption. However when the user
plus into a computer all of the files are immediately accessible. Which of the following should the
user do to enforce full device confidentiality should the phone be lost or stolen?
Which of the following should be used to allow fir proper communication between internet users and the interna
The network manager has obtained a public IP address for use with a new system to be available
via the internet. This system will be placed in the DMZ and will communicate with a database
server on the LAN. Which of the following should be used to allow fir proper communication
between internet users and the internal systems?