Which of the following would meet all three goals?
A company hosts its public websites internally. The administrator would like to make some
changes to the architecture.
The three goals are:
(1) reduce the number of public IP addresses in use by the web servers
(2) drive all the web traffic through a central point of control
(3) mitigate automated attacks that are based on IP address scanning
Which of the following would meet all three goals?
Which of the following systems should be deployed?
Ann is the data owner of financial records for a company. She has requested that she have the
ability to assign read and write privileges to her folders. The network administrator is tasked with
setting up the initial access control system and handing Ann’s administrative capabilities. Which of
the following systems should be deployed?
Which of the following policies is being enforced?
The IT department noticed that there was a significant decrease in network performance during
the afternoon hours. The IT department performed analysis of the network and discovered this
was due to users accessing and downloading music and video streaming from social sites. The IT
department notified corporate of their findings and a memo was sent to all employees addressing
the misuse of company resources and requesting adherence to company policy. Which of the
following policies is being enforced?
This is an example of:
A computer security officer has investigated a possible data breach and has found it credible. The
officer notifies the data center manager and the Chief Information Security Officer (CISO). This is
an example of:
Which of the following would be the BEST option?
A small company wants to employ PKI. The company wants a cost effective solution that must be
simple and trusted. They are considering two options: X.509 and PGP. Which of the following
would be the BEST option?
Which of the following would BEST mitigate this issue?
Ann was reviewing her company’s event logs and observed several instances of GUEST
accessing the company print server, file server, and archive database. As she continued to
investigate, Ann noticed that it seemed to happen at random intervals throughout the day, but
mostly after the weekly automated patching and often logging in at the same time. Which of the
following would BEST mitigate this issue?
Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server
that is used by several employees. Which of the following is the BEST approach for
implementation of the new application on the virtual server?
Which of the following could be utilized to provide protection from this type of attack?
A security administrator is notified that users attached to a particular switch are having intermittent
connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing
attack. Which of the following could be utilized to provide protection from this type of attack?
which of the following would be the BEST way to share the file with Joe?
Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT
group, to edit a file. Currently, the file has the following permissions:
Ann: read/write
Sales Group: read
IT Group: no access
If a discretionary access control list is in place for the files owned by Ann, which of the following
would be the BEST way to share the file with Joe?
Which of the following would meet the requirements of this scenario?
A company would like to take electronic orders from a partner; however, they are concerned that a
non-authorized person may send an order. The legal department asks if there is a solution that
provides non-repudiation. Which of the following would meet the requirements of this scenario?