Which of the following would provide the IT department with the BEST solution?
A cafe provides laptops for Internet access to their customers. The cafe is located in the center
corridor of a busy shopping mall. The company has experienced several laptop thefts from the
cafe during peak shopping hours of the day. Corporate has asked that the IT department provide a
solution to eliminate laptop theft. Which of the following would provide the IT department with the
BEST solution?
Which of the following controls would BEST address this security concern?
A business has set up a Customer Service kiosk within a shopping mall. The location will be
staffed by an employee using a laptop during the mall business hours, but there are still concerns
regarding the physical safety of the equipment while it is not in use. Which of the following controls
would BEST address this security concern?
Which of the following has been reported by the vulnerability scan?
Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent
penetration test reveals vulnerabilities on the network. Which of the following has been reported by
the vulnerability scan?
Which of the following documents outlines the technical and security requirements of an agreement between or
Which of the following documents outlines the technical and security requirements of an
agreement between organizations?
Which of the following would be a customer concern if the offshore staff had direct access to their data?
A large bank has moved back office operations offshore to another country with lower wage costs
in an attempt to improve profit and productivity. Which of the following would be a customer
concern if the offshore staff had direct access to their data?
Which of the following are examples of detective controls?
Which of the following are examples of detective controls?
which of the following technologies?
An organization processes credit card transactions and is concerned that an employee may
intentionally email credit card numbers to external email addresses. This company should
consider which of the following technologies?
Which of the following, if properly implemented, would prevent users from accessing files that are unrelated t
Which of the following, if properly implemented, would prevent users from accessing files that are
unrelated to their job duties? (Select TWO).
Which of the following helps to establish an accurate timeline for a network intrusion?
Which of the following helps to establish an accurate timeline for a network intrusion?
Which of the following practices could be used to increase the security posture during deployment?
A recent audit has revealed weaknesses in the process of deploying new servers and network
devices. Which of the following practices could be used to increase the security posture during
deployment? (Select TWO).