Which of the following should the administrator implement?
An administrator finds that non-production servers are being frequently compromised, production
servers are rebooting at unplanned times and kernel versions are several releases behind the
version with all current security fixes. Which of the following should the administrator implement?
Which of the following would mitigate and secure the auditors finding?
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts
were later identified as contractors’ accounts who would be returning in three months and would
need to resume the activities. Which of the following would mitigate and secure the auditors
finding?
Which of the following should be implemented in order to compliment password usage and smart cards?
Ann, the security administrator, wishes to implement multifactor security. Which of the following
should be implemented in order to compliment password usage and smart cards?
Which of the following methods should the company consider to secure this data in the future?
Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles
of a particular vendor. Which of the following methods should the company consider to secure this
data in the future?
Which of the following methods should the system administrator implement?
A new intern was assigned to the system engineering department, which consists of the system
architect and system software developer’s teams. These two teams have separate privileges. The
intern requires privileges to view the system architectural drawings and comment on some
software development projects. Which of the following methods should the system administrator
implement?
which of the following?
One of the system administrators at a company is assigned to maintain a secure computer lab.
The administrator has rights to configure machines, install software, and perform user account
maintenance. However, the administrator cannot add new computers to the domain, because that
requires authorization from the Information Assurance Officer. This is an example of which of the
following?
Which of the following options would be the BEST solution at a minimal cost?
A small business needs to incorporate fault tolerance into their infrastructure to increase data
availability. Which of the following options would be the BEST solution at a minimal cost?
Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server
that is used by several employees.
Which of the following is the BEST approach for implementation of the new application on the
virtual server?
Which of the following should Ann use in order to sign the file?
Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign
the file?
Which of the following protocols is used to validate whether trust is in place and accurate by returning respo
Which of the following protocols is used to validate whether trust is in place and accurate by
returning responses of either “good”, “unknown”, or “revoked”?