Which of the following mitigation techniques would address this concern?
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is
concerned that sensitive files can be copied to the USB drives. Which of the following mitigation
techniques would address this concern? (Select TWO).
Which of the following types of authentication is being utilized here?
A company has purchased an application that integrates into their enterprise user directory for account
authentication. Users are still prompted to type in their usernames and passwords. Which of the
following types of authentication is being utilized here?
Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home address
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the
house living room. Joe posts the picture on a popular social media site together with the message:
“Heading to our two weeks vacation to Italy.” Upon returning home, Joe discovers that the house was
burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew
Joe’s home address?
Which of the following would be MOST effective for preventing this behavior?
The call center supervisor has reported that many employees have been playing preinstalled games on
company computers and this is reducing productivity.
Which of the following would be MOST effective for preventing this behavior?
Which of the following would prevent a user from installing a program on a company-owned mobile device?
Which of the following would prevent a user from installing a program on a company-owned mobile
device?
Which of the following PKI concepts is this describing?
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A
trusts Organization C. Which of the following PKI concepts is this describing?
Which of the following can be performed when an element of the company policy cannot be enforced by technical
Which of the following can be performed when an element of the company policy cannot be enforced by
technical means?
Which of the following file systems is from Microsoft and was included with their earliest operating systems?
Which of the following file systems is from Microsoft and was included with their earliest operating
systems?
Which of the following will BEST meet this requirement?
An IT security technician needs to establish host based security for company workstations. Which of the
following will BEST meet this requirement?
which of the following?
Disabling unnecessary services, restricting administrative access, and enabling auditing controls on a
server are forms of which of the following?