Which of the following BEST protects the credit card data?
A merchant acquirer has the need to store credit card numbers in a transactional database in a high
performance environment. Which of the following BEST protects the credit card data?
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specifi
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a
specific table?
Which of the following explains the reason for the increase in disk space usage?
A database administrator would like to start encrypting database exports stored on the SAN, but the
storage administrator warns that this may drastically increase the amount of disk space used by the
exports. Which of the following explains the reason for the increase in disk space usage?
which already deploys full disk encryption?
Which of the following is an advantage of implementing individual file encryption on a hard drive which
already deploys full disk encryption?
Which of the following BEST protects the master password list?
A team of firewall administrators have access to a `master password list’ containing service account
passwords. Which of the following BEST protects the master password list?
Which of the following would BEST address the administrator’s concerns?
A security administrator has concerns regarding employees saving data on company provided mobile
devices. Which of the following would BEST address the administrator’s concerns?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile dev
Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile
device theft?
Which of the following describes how this private key should be stored so that it is protected from theft?
An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of
the following describes how this private key should be stored so that it is protected from theft?