Which of the following policies is being enforced?
The IT department noticed that there was a significant decrease in network performance during the
afternoon hours. The IT department performed analysis of the network and discovered this was due to
users accessing and downloading music and video streaming from social sites. The IT department notified
corporate of their findings and a memo was sent to all employees addressing the misuse of company
resources and requesting adherence to company policy. Which of the following policies is being
enforced?
This is an example of:
A computer security officer has investigated a possible data breach and has found it credible. The officer
notifies the data center manager and the Chief Information Security Officer (CISO). This is an example of:
Which of the following would meet the requirements of this scenario?
A company would like to take electronic orders from a partner; however, they are concerned that a nonauthorized person may send an order. The legal department asks if there is a solution that provides nonrepudiation. Which of the following would meet the requirements of this scenario?
Which of the following is occurring?
The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler. Which of the
following is occurring?
Which of the following describes this type of data?
A security administrator is auditing a database server to ensure the correct security measures are in place
to protect the data. Some of the fields consist of people’s first name, last name, home address, date of
birth and mothers last name. Which of the following describes this type of data?
Which of the following BEST prevents this situation from occurring in the future?
Several employees clicked on a link in a malicious message that bypassed the spam filter and their PCs
were infected with malware as a result. Which of the following BEST prevents this situation from
occurring in the future?
which of the following types of security controls?
Visible security cameras are considered to be which of the following types of security controls?
Which of the following security controls BEST accomplishes this goal?
A security administrator would like to ensure that system administrators are not using the same password
for both their privileged and non-privileged accounts. Which of the following security controls BEST
accomplishes this goal?
Which of the following could Ann implement to help identify accounts that are still active for terminated empl
Ann, a security analyst, has discovered that her company has very high staff turnover and often user
accounts are not disabled after an employee leaves the company. Which of the following could Ann
implement to help identify accounts that are still active for terminated employees?
Which of the following BEST describes the type of system Ann is installing?
Ann, the system administrator, is installing an extremely critical system that can support ZERO downtime.
Which of the following BEST describes the type of system Ann is installing?