Which of the following is the BEST policy to implement?
XYZ Corporation is about to purchase another company to expand its operations. The CEO is concerned
about information leaking out, especially with the cleaning crew that comes in at night.The CEO would like to ensure no paper files are leaked. Which of the following is the BEST policy to
implement?
Which of the following could a security administrator implement to mitigate the risk of tailgating for a large
Which of the following could a security administrator implement to mitigate the risk of tailgating for a
large organization?
Which of the following is a security concern regarding users bringing personally-owned devices that they conne
Which of the following is a security concern regarding users bringing personally-owned devices that they
connect to the corporate network?
Which of the following might the administrator do in the short term to prevent the emails from being received?
Several employees submit the same phishing email to the administrator. The administrator finds that the
links in the email are not being blocked by the company’s security device. Which of the following might
the administrator do in the short term to prevent the emails from being received?
Which of the following can the researcher do to determine if the file is malicious in nature?
A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file
was found on an underused server and appears to contain a zero-day exploit. Which of the following can
the researcher do to determine if the file is malicious in nature?
which of the following?
A security administrator has concerns about new types of media which allow for the mass distribution of
personal comments to a select group of people. To mitigate the risks involved with this media, employees
should receive training on which of the following?
which of the following?
The information security team does a presentation on social media and advises the participants not to
provide too much personal information on social media web sites. This advice would BEST protect people
from which of the following?
which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In addition to
protecting company information from being accidentally leaked, which additional security benefit does
this provide?
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following has serious security implications for large organizations and can potentially allow an
Which of the following has serious security implications for large organizations and can potentially allow
an attacker to capture conversations?