Which of the following is the BEST policy to implement?
XYZ Corporation is about to purchase another company to expand its operations. The CEO is
concerned about information leaking out, especially with the cleaning crew that comes in at night.
The CEO would like to ensure no paper files are leaked. Which of the following is the BEST policy
to implement?
Which of the following could a security administrator implement to mitigate the risk of tailgating for a large
Which of the following could a security administrator implement to mitigate the risk of tailgating for
a large organization?
Which of the following is a security concern regarding users bringing personally-owned devices that they conne
Which of the following is a security concern regarding users bringing personally-owned devices
that they connect to the corporate network?
Which of the following is a security concern regarding users bringing personally-owned devices that they conne
Which of the following is a security concern regarding users bringing personally-owned devices
that they connect to the corporate network?
Which of the following might the administrator do in the short term to prevent the emails from being received?
Several employees submit the same phishing email to the administrator. The administrator finds
that the links in the email are not being blocked by the company’s security device. Which of the
following might the administrator do in the short term to prevent the emails from being received?
Which of the following can the researcher do to determine if the file is malicious in nature?
A security researcher wants to reverse engineer an executable file to determine if it is malicious.
The file was found on an underused server and appears to contain a zero-day exploit. Which of
the following can the researcher do to determine if the file is malicious in nature?
which of the following?
A security administrator has concerns about new types of media which allow for the mass
distribution of personal comments to a select group of people. To mitigate the risks involved with
this media, employees should receive training on which of the following?
which of the following?
The information security team does a presentation on social media and advises the participants
not to provide too much personal information on social media web sites. This advice would BEST
protect people from which of the following?
which of the following?
The information security team does a presentation on social media and advises the participants
not to provide too much personal information on social media web sites. This advice would BEST
protect people from which of the following?
which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?