Which of the following is a contract with a service pro…
Which of the following is a contract with a service provider that typically includes performance parameters like MTBF and MTTR?
In the case where a company creates a private cloud, th…
One of the driving factors towards moving an application to a cloud infrastructure is increased application availability. In the case where a company creates a private
cloud, the risk of application downtime is being:
Which of the following security goals is the company tr…
A company uses digital signatures to sign contracts. The company requires external entities to create an account with a third-party digital signature provider and to
sign an agreement stating that they will protect the account from unauthorized access. Which of the following security goals is the company trying to address in the
given scenario?
Which of the following solutions would have prevented t…
Several computers in an organization are running below the normal performance baseline. A security administrator inspects the computers and finds the following
pieces of information:
– Several users have uninstalled the antivirus software
– Some users have installed unauthorized software
– Several users have installed pirated software
– Some computers have had automatic updating disabled after being deployed
– Users have experienced slow responsiveness when using the Internet browser
– Users have complete control over critical system properties
Which of the following solutions would have prevented these issues from occurring? (Select TWO).
Which of the following is an active technique that will…
An attacker is attempting to determine the patch level version that a web server is running on its open ports. Which of the following is an active technique that will
MOST efficiently determine the information the attacker is seeking?
Which of the following should be implemented to prevent…
A user is able to access shares that store confidential information that is not related to the user’s current job duties. Which of the following should be implemented
to prevent this from occurring?
Which of the following could the administrator use?
An administrator must select an algorithm for creating hashes of critical system files in order to later detect any unauthorized changes. Which of the following could
the administrator use? (Select TWO).
Which of the following portions of the company’s mobile…
A retired employee did not return a company issued mobile device and may have company data on the device. Which of the following portions of the company’s
mobile device management solution could be used together to remove the company data from the employee’s device? (Select TWO)
which of the following documents would the manager MOST…
A manager is reviewing bids for Internet service in support of a new corporate office location. The location will provide 24-hour service to the organization’s global
user population. In which of the following documents would the manager MOST likely find quantitative data regarding latency levels and MTTR?
Which of the following is useful in this scenario?
A forensics expert needs to be able to prove that digital evidence, originally taken into custody, has not been tampered with. Which of the following is useful in this
scenario?