Which of the following is the MOST appropriate control for the architect to focus onto ensure confidentiality
A security architect is designing an enterprise solution for the sales force of a corporation which
handles sensitive customer data. The solution must allow users to work from remote offices and
support traveling users. Which of the following is the MOST appropriate control for the architect to
focus onto ensure confidentiality of data stored on laptops?
Which of the following BEST meets that requirement?
A security administrator needs a method to ensure that only employees can get onto the internal
network when plugging into a network switch. Which of the following BEST meets that
requirement?
which of the following security controls?
Having adequate lighting on the outside of a building is an example of which of the following
security controls?
Which of the following would help reduce the amount of risk the organization incurs in this situation in the f
During a recent audit, it was discovered that several user accounts belonging to former employees
were still active and had valid VPN permissions. Which of the following would help reduce the
amount of risk the organization incurs in this situation in the future?
which of the following documents would this concern MOST likely be addressed?
An organization is working with a cloud services provider to transition critical business applications
to a hybrid cloud environment. The organization retains sensitive customer data and wants to
ensure the provider has sufficient administrative and logical controls in place to protect its data. In
which of the following documents would this concern MOST likely be addressed?
Which of the following should be implemented?
A security administrator wants to implement a company-wide policy to empower data owners to
manage and enforce access control rules on various resources. Which of the following should be
implemented?
Which of the following BEST describes an attack where communications between two parties…?
Which of the following BEST describes an attack where communications between two parties are
intercepted and forwarded to each party with neither party being aware of the interception and
potential modification to the communications?
Which of the following protocols would BEST facilitate secure file transfers?
A security administrator wishes to implement a secure a method of file transfer when
communicating with outside organizations. Which of the following protocols would BEST facilitate
secure file transfers? (Select TWO)
Which of the following MUST the technician implement?
A technician needs to implement a system which will properly authenticate users by their
username and password only when the users are logging in from a computer in the office building.
Any attempt to authenticate from a location other than the office building should be rejected.
Which of the following MUST the technician implement?
Which of the following is the MOST likely reason the thermostat is not connecting to the internet?
After correctly configuring a new wireless enabled thermostat to control the temperature of the
company’s meeting room, Joe, a network administrator determines that the thermostat is not
connecting to the internet-based control system. Joe verifies that the thermostat received the
expected network parameters and it is associated with the AP. Additionally, the other wireless
mobile devices connected to the same wireless network are functioning properly. The network
administrator verified that the thermostat works when tested at his residence. Which of the
following is the MOST likely reason the thermostat is not connecting to the internet?