Which of the following could Ann implement to help identify accounts that are still active for terminated empl
Ann, a security analyst, has discovered that her company has very high staff turnover and often
user accounts are not disabled after an employee leaves the company. Which of the following
could Ann implement to help identify accounts that are still active for terminated employees?
Which of the following BEST describes the type of system Ann is installing?
Ann, the system administrator, is installing an extremely critical system that can support ZERO
downtime. Which of the following BEST describes the type of system Ann is installing?
Which of the following should the engineer choose to meet these requirements?
A systems engineer has been presented with storage performance and redundancy requirements
for a new system to be built for the company. The storage solution must be designed to support
the highest performance and must also be able to support more than one drive failure. Which of
the following should the engineer choose to meet these requirements?
Which of the following is MOST important to the security manager?
In order to secure additional budget, a security manager wants to quantify the financial impact of a
one-time compromise. Which of the following is MOST important to the security manager?
Which of the following can be used to ensure the integrity of the logs after they are collected?
A company has just deployed a centralized event log storage system. Which of the following can
be used to ensure the integrity of the logs after they are collected?
Which of the following choices BEST mitigates the range of risks associated with the continued use of remova
Several departments in a corporation have a critical need for routinely moving data from one
system to another using removable storage devices. Senior management is concerned with data
loss and the introduction of malware on the network. Which of the following choices BEST
mitigates the range of risks associated with the continued use of removable storage devices?
Which of the following procedures could have been implemented to aid the authorities in their investigation?
A company executive’s laptop was compromised, leading to a security breach. The laptop was
placed into storage by a junior system administrator and was subsequently wiped and re-imaged.
When it was determined that the authorities would need to be involved, there was little evidence to
present to the investigators. Which of the following procedures could have been implemented to
aid the authorities in their investigation?
Which of the following should the company have employees acknowledge before allowing them to access the corpor
A company has recently allowed employees to take advantage of BYOD by installing WAPs
throughout the corporate office. An employee, Joe, has recently begun to view inappropriate
material at work using his personal laptop. When confronted, Joe indicated that he was never told
that he could not view that type of material on his personal laptop. Which of the following should
the company have employees acknowledge before allowing them to access the corporate WLAN
with their personal devices?
Which of the following should be in place?
A company has two server administrators that work overnight to apply patches to minimize
disruption to the company. With the limited working staff, a security engineer performs a risk
assessment to ensure the protection controls are in place to monitor all assets including the
administrators in case of an emergency. Which of the following should be in place?
Which of the following describes the disaster?
A company’s Chief Information Officer realizes the company cannot continue to operate after a
disaster. Which of the following describes the disaster?