Which of the following recommendations should be implemented to keep the device from posing a security risk t
The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants
to connect it to the company’s internal network. The Chief Information Security Officer (CISO) was
told to research and recommend how to secure this device.
Which of the following recommendations should be implemented to keep the device from posing a
security risk to the company?
Which of the following measures should be implemented to minimize the risk of hosting email in the cloud?
The Chief Executive Officer (CEO) of a corporation decided to move all email to a cloud computing
environment. The Chief Information Security Officer (CISO) was told to research the risk involved
in this environment.
Which of the following measures should be implemented to minimize the risk of hosting email in
the cloud?
Which of the following should be implemented, keeping in mind that the CEO has stated that this access is requ
The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants
to connect it to the internal network. The Chief Information Security Officer (CISO) was told to
research and recommend how to secure this device.
Which of the following should be implemented, keeping in mind that the CEO has stated that this
access is required?
which of the following processes?
The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and
connected it to the internal network. The CEO proceeded to download sensitive financial
documents through their email. The device was then lost in transit to a conference. The CEO
notified the company helpdesk about the lost device and another one was shipped out, after which
the helpdesk ticket was closed stating the issue was resolved.
This data breach was not properly reported due to insufficient training surrounding which of the
following processes?
Which of the following business areas should primarily be involved in this discussion?
An employee was terminated and promptly escorted to their exit interview, after which the
employee left the building. It was later discovered that this employee had started a consulting
business using screen shots of their work at the company which included live customer data. This
information had been removed through the use of a USB device. After this incident, it was
determined a process review must be conducted to ensure this issue does not recur.
Which of the following business areas should primarily be involved in this discussion? (Select
TWO).
Which of the following methods allows a certificate to be validated by a single server that returns the validi
A technician states that workstations that are on the network in location B are unable to validate
certificates, while workstations that are on the main location A’s network are having no issues.
Which of the following methods allows a certificate to be validated by a single server that returns
the validity of that certificate?
Which of the following policies would need to be developed?
A system administrator needs to develop a policy for when an application server is no longer
needed. Which of the following policies would need to be developed?
Which of the following should be practiced to avoid a security risk?
A web administrator develops a web form for users to respond to the company via a web page.
Which of the following should be practiced to avoid a security risk?
Which of the following should the user perform?
A user reports that the workstation’s mouse pointer is moving and files are opening automatically.
Which of the following should the user perform?
Which of the CIA requirements is BEST met by multipathing?
A system designer needs to factor in CIA requirements for a new SAN. Which of the CIA
requirements is BEST met by multipathing?