Which of the following strategies would the administrator MOST likely implement?
An administrator wants to minimize the amount of time needed to perform backups during the week. It is
also acceptable to the administrator for restoration to take an extended time frame.
Which of the following strategies would the administrator MOST likely implement?
Which of the following MUST be done before any actual switch configuration is performed?
A security administrator needs to update the OS on all the switches in the company. Which of the
following MUST be done before any actual switch configuration is performed?
Which of the following strategies would BEST mitigate this risk?
Developers currently have access to update production servers without going through an approval
process. Which of the following strategies would BEST mitigate this risk?
Which of the following mitigation strategies is established to reduce risk when performing updates to business
Which of the following mitigation strategies is established to reduce risk when performing updates to
business critical systems?
Which of the following processes is being followed to ensure application integrity?
The network administrator is responsible for promoting code to applications on a DMZ web server. Which
of the following processes is being followed to ensure application integrity?
Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails
Which of the following MOST specifically defines the procedures to follow when scheduled system
patching fails resulting in system outages?
Which of the following should be in place to meet these two goals?
A security engineer is given new application extensions each month that need to be secured prior to
implementation. They do not want the new extensions to invalidate or interfere with existing application
security. Additionally, the engineer wants to ensure that the new requirements are approved by the
appropriate personnel. Which of the following should be in place to meet these two goals? (Select TWO).
Which of the following should the user do NEXT?
A user has received an email from an external source which asks for details on the company’s new
product line set for release in one month. The user has a detailed spec sheet but it is marked “Internal
Proprietary Information”. Which of the following should the user do NEXT?
Which of the following is BEST carried out immediately after a security breach is discovered?
Which of the following is BEST carried out immediately after a security breach is discovered?
Which of the following strategies should be implemented to ensure the Risk Manager and CIO are not caught unaw
A security analyst informs the Chief Executive Officer (CEO) that a security breach has just occurred. This
results in the Risk Manager and Chief Information Officer (CIO) being caught unaware when the CEO asks
for further information. Which of the following strategies should be implemented to ensure the Risk
Manager and CIO are not caught unaware in the future?