Which of the following does this demonstrate?
A security manager installed a standalone fingerprint reader at the data center. All employees that need
to access the data center have been enrolled to the reader and local reader database is always kept
updates. When an employee who has been enrolled uses the fingerprint reader the door to the data
center opens. Which of the following does this demonstrate? (Select THREE)
Which of the following IP address/subnet mask combinations could be used to correctly configure a client machi
A network technician is configuring clients for VLAN access. The network address for the sales
department is 192.168.0.64 with a broadcast address of 192.168.0.71. Which of the following IP
address/subnet mask combinations could be used to correctly configure a client machine in the sales
department?
Which of the following would BEST assist in correcting this issue?
The help desk is experiencing a higher than normal amount of calls from users reporting slow response
from the application server. After analyzing the data from a packet capturing tool, the head of the
network engineering department determines that the issue is due, in part from the increase of personnel
recently hired to perform application development. Which of the following would BEST assist in
correcting this issue?
Which of the following should be the PRIMARY security considerations by the security managers at each organiza
Two organizations want to share sensitive data with one another from their IT systems to support a
mutual customer base. Both organizations currently have secure network and security policies and
procedures. Which of the following should be the PRIMARY security considerations by the security
managers at each organization prior to sharing information? (Select THREE)
Which of the following if implemented would violate company policy?
A company’s password and authentication policies prohibit the use of shared passwords and transitive
trust. Which of the following if implemented would violate company policy? (Select TWO)
Which of the following types of attacks is based on coordinating small slices of a task across multiple system
Which of the following types of attacks is based on coordinating small slices of a task across multiple
systems?
Which of the following would MOST likely help in achieving this goal?
A system security analyst wants to capture data flowing in and out of the enterprise. Which of the
following would MOST likely help in achieving this goal?
Which of the following should be used to automate this process?
The security manager reports that the process of revoking certificates authority is too slow and should be
automated. Which of the following should be used to automate this process?
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
A user attempts to install a new and relatively unknown software program recommended by a colleague.
The user is unable to install the program, dispute having successfully installed other programs previously.
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
Which of the following technologies is the MOST appropriate storage?
A company needs to provide web-based access to shared data sets to mobile users, while maintaining a
standardized set of security controls. Which of the following technologies is the MOST appropriate
storage?