Which of the following systems should be deployed?
Ann is the data owner of financial records for a company. She has requested that she have the ability to
assign read and write privileges to her folders. The network administrator is tasked with setting up the
initial access control system and handing Ann’s administrative capabilities. Which of the following systems
should be deployed?
Which of the following would BEST mitigate this issue?
Ann was reviewing her company’s event logs and observed several instances of GUEST accessing the
company print server, file server, and archive database. As she continued to investigate, Ann noticed that
it seemed to happen at random intervals throughout the day, but mostly after the weekly automated
patching and often logging in at the same time. Which of the following would BEST mitigate this issue?
which of the following would be the BEST way to share the file with Joe?
Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit
a file. Currently, the file has the following permissions:
Ann: read/write
Sales Group: read
IT Group: no access
If a discretionary access control list is in place for the files owned by Ann, which of the following would be
the BEST way to share the file with Joe?
Which of the following policies should be enforced to initiate a password change?
A network administrator, Joe, arrives at his new job to find that none of the users have changed their
network passwords since they were initially hired. Joe wants to have everyone change their passwords
immediately. Which of the following policies should be enforced to initiate a password change?
Which of the following would BEST alleviate her concerns?
Ann, a security administrator at a call center, has been experiencing problems with users intentionally
installing unapproved and occasionally malicious software on their computers. Due to the nature of their
jobs, Ann cannot change their permissions. Which of the following would BEST alleviate her concerns?
Which of the following should be used to authenticate and log connections from wireless users connecting with
Which of the following should be used to authenticate and log connections from wireless users
connecting with EAP-TLS?
Which of the following could prevent this scenario from occurring?
Ann has recently transferred from the payroll department to engineering. While browsing file shares, Ann
notices she can access the payroll status and pay rates of her new coworkers. Which of the following
could prevent this scenario from occurring?
Which of the following would meet the objectives of the security policy?
An organization’s security policy states that users must authenticate using something you do. Which of
the following would meet the objectives of the security policy?
Which of the following protocols is MOST likely to be leveraged by users who need additional information about
Which of the following protocols is MOST likely to be leveraged by users who need additional information
about another user?
Which of the following is a system that will support the requirement on its own?
The security manager wants to unify the storage of credential, phone numbers, office numbers, and
address information into one system. Which of the following is a system that will support the
requirement on its own?