Which of the following is a system that will support the requirement on its own?
The security manager wants to unify the storage of credential, phone numbers, office numbers,
and address information into one system. Which of the following is a system that will support the
requirement on its own?
SQL databases in a three-tier environment?
Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier
environment?
Which of the following is MOST important to the security manager?
In order to secure additional budget, a security manager wants to quantify the financial impact of a
one-time compromise. Which of the following is MOST important to the security manager?
Which of the following can be used to ensure the integrity of the logs after they are collected?
A company has just deployed a centralized event log storage system. Which of the following can
be used to ensure the integrity of the logs after they are collected?
Which of the following would be MOST effective for preventing this behavior?
The call center supervisor has reported that many employees have been playing preinstalled
games on company computers and this is reducing productivity. Which of the following would be
MOST effective for preventing this behavior?
Which of the following authentication services is he MOST likely using?
Joe, a network administrator, is able to manage the backup software console by using his network
login credentials. Which of the following authentication services is he MOST likely using?
Which of the following would BEST meet this security goal?
A system administrator wants to confidentially send a user name and password list to an individual
outside the company without the information being detected by security controls. Which of the
following would BEST meet this security goal?
Which of the following choices BEST mitigates the range of risks associated with the continued use of removabl
Several departments in a corporation have a critical need for routinely moving data from one
system to another using removable storage devices. Senior management is concerned with data
loss and the introduction of malware on the network. Which of the following choices BEST
mitigates the range of risks associated with the continued use of removable storage devices?
Which of the following would be the BEST course of action for the consultant to recommend?
A retail store uses a wireless network for its employees to access inventory from anywhere in the
store. Due to concerns regarding the aging wireless network, the store manager has brought in a
consultant to harden the network. During the site survey, the consultant discovers that the network
was using WEP encryption. Which of the following would be the BEST course of action for the
consultant to recommend?
Which of the following procedures could have been implemented to aid the authorities in their investigation?
A company executive’s laptop was compromised, leading to a security breach. The laptop was
placed into storage by a junior system administrator and was subsequently wiped and re-imaged.
When it was determined that the authorities would need to be involved, there was little evidence to
present to the investigators. Which of the following procedures could have been implemented to
aid the authorities in their investigation?