PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following actions should the security administrator take?

A company has hired a security administrator to maintain and administer Linux and Windowsbased systems. Written in the nightly report file is the followinG.
Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours

later the size has decreased considerably. Another hour goes by and the log files have shrunk in
size again.
Which of the following actions should the security administrator take?

Which of the following is the most secure encryption protocol that the network administrator should recommend?

A person approaches a network administrator and wants advice on how to send encrypted email
from home. The end user does not want to have to pay for any license fees or manage server
services. Which of the following is the most secure encryption protocol that the network
administrator should recommend?

You can always defend yourself by "ignorance of the law" clause.

A company is legally liable for the content of email that is sent from its systems, regardless of
whether the message was sent for private or business-related purposes. This could lead to
prosecution for the sender and for the company’s directors if, for example, outgoing email was

found to contain material that was pornographic, racist, or likely to incite someone to commit an
act of terrorism. You can always defend yourself by “ignorance of the law” clause.


Page 158 of 555« First...102030...156157158159160...170180190...Last »