Which of the following lists is the BEST combination of security controls to implement?
A small IT security form has an internal network composed of laptops, servers, and printers. The
network has both wired and wireless segments and supports VPN access from remote sites. To
protect the network from internal and external threats, including social engineering attacks, the
company decides to implement stringent security controls. Which of the following lists is the BEST
combination of security controls to implement?
Which of the following solutions is most appropriate for the analyst to recommend in this scenario?
A security analyst is working on a project team responsible for the integration of an enterprise
SSO solution. The SSO solution requires the use of an open standard for the exchange of
authentication and authorization across numerous web based applications. Which of the following
solutions is most appropriate for the analyst to recommend in this scenario?
Which of the following is a mobile device security control that ensures the confidentiality of company data?
A thief has stolen mobile device and removed its battery to circumvent GPS location tracking. The
device user is a four digit PIN. Which of the following is a mobile device security control that
ensures the confidentiality of company data?
Which of the following identifies a possible next step for the administrator?
A user has called the help desk to report an enterprise mobile device was stolen. The technician
receiving the call accesses the MDM administration portal to identify the device’s last known
geographic location. The technician determines the device is still communicating with the MDM.
After taking note of the last known location, the administrator continues to follow the rest of the
checklist. Which of the following identifies a possible next step for the administrator?
Which of the following forms of risk mitigation has the CIO elected to pursue?
A risk management team indicated an elevated level of risk due to the location of a corporate
datacenter in a region with an unstable political climate. The chief information officer (CIO) accepts
the recommendation to transition the workload to an alternate datacenter in a more stable region.
Which of the following forms of risk mitigation has the CIO elected to pursue?
Which of the following would be the best choice to implement to address this audit concern while maintain the
During a recent audit, the auditors cited the company’s current virtual machine infrastructure as a
concern. The auditors cited the fact that servers containing sensitive customer information reside
on the same physical host as numerous virtual machines that follow less stringent security guild
lines. Which of the following would be the best choice to implement to address this audit concern
while maintain the current infrastructure?
Which of the following reasons could have caused this port to be disabled?
A switch is set up to allow only 2 simultaneous MAC addresses per switch port. An administrator is
reviewing a log and determines that a switch ort has been deactivated in a conference room after
it detected 3 or more MAC addresses on the same port. Which of the following reasons could have
caused this port to be disabled?
Which of the following network controls would meet these requirements?
A network administrator was to implement a solution that will allow authorized traffic, deny
unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and
UDP protocols. Which of the following network controls would meet these requirements?
Which of the following most likely happened?
Client computers login at specified times to check and update antivirus definitions using a
dedicated account configured by the administrator. One day the clients are unable to login with the
account, but the server still responds to ping requests. The administrator has not made any
changed. Which of the following most likely happened?
Which of the following is the best way to collect this type of information?
In performing an authorized penetration test of an organization’s system security, a penetration
tester collects information pertaining to the application versions that reside on a server. Which of
the following is the best way to collect this type of information?