which of the following would BEST prevent access to the…
An administrator has concerns regarding the traveling sales team who works primarily from smart phones.
Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case
of loss or theft?
Which of the following is the BEST way to accomplish this?
A network administrator wants to ensure that users do not connect any unauthorized devices to the company
network. Each desk needs to connect a VoIP phone and computer.
Which of the following is the BEST way to accomplish this?
Which of the following tool or technology would work BE…
While reviewing the monthly internet usage it is noted that there is a large spike in traffic classified as“unknown” and does not appear to be within the bounds of the organizations Acceptable Use Policy.
Which of the following tool or technology would work BEST for obtaining more information on this traffic?
Which of the following technical modifications to the a…
The Chief Security Officer (CISO) at a multinational banking corporation is reviewing a plan to upgrade the
entire corporate IT infrastructure. The architecture consists of a centralized cloud environment hosting the
majority of data, small server clusters at each corporate location to handle the majority of customer transaction
processing, ATMs, and a new mobile banking application accessible from smartphones, tablets, and the
Internet via HTTP. The corporation does business having varying data retention and privacy laws.
Which of the following technical modifications to the architecture and corresponding security controls should be
implemented to provide the MOST complete protection of data?
Which of the following is being used?
A technician has installed new vulnerability scanner software on a server that is joined to the company domain.
The vulnerability scanner is able to provide visibility over the patch posture of all company’s clients.
Which of the following is being used?
Which of the following MUST be implemented to support t…
A security administrator must implement a system to ensure that invalid certificates are not used by a custom
developed application. The system must be able to check the validity of certificates even when internet access
is unavailable.
Which of the following MUST be implemented to support this requirement?
Which of the following is the BEST course of action to …
A portable data storage device has been determined to have malicious firmware.
Which of the following is the BEST course of action to ensure data confidentiality?
Which of the following should be implemented to correct…
Technicians working with servers hosted at the company’s datacenter are increasingly complaining of electric
shocks when touching metal items which have been linked to hard drive failures.
Which of the following should be implemented to correct this issue?
Which of the following attacks is this an example of?
A web application is configured to target browsers and allow access to bank accounts to siphon money to a
foreign account.
Which of the following attacks is this an example of?
Which of the following works by implanting software on …
Which of the following works by implanting software on systems but delays execution until a specific set of
conditions is met?