PrepAway - Latest Free Exam Questions & Answers

Tag: Exam EX0-106 (update November 13th, 2014)

Exam EX0-106: SCNS Tactical Perimeter Defense (update November 13th, 2014)

What are Network Securitys five major issues?

The organization you work for has recently decided to have a greater focus on security issues.
You run the network, and are called in the meeting to discuss these changes. After the initial
meeting you are asked to research and summarize the major issues of network security that you
believe the organization should address. What are Network Securitys five major issues?

Which of the following are the reasons that the current auditing has little value?

You were recently hired as the security administrator of a small business. You are reviewing the
current state of security in the network and find that the current logging system must be
immediately modified. As the system is currently configured, auditing has no practical value.
Which of the following are the reasons that the current auditing has little value?

Which of the following best describes an Operational audit?

The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Operational Audit and are describing it to your
coworkers. Which of the following best describes an Operational audit?

Which of the following best describes an Independent Audit?

The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Independent Audit and are describing it to your
coworkers. Which of the following best describes an Independent Audit?

Which of the following best describes Authentication?

You have been hired at a large company to manage network security issues. Prior to your arrival,
there was no one dedicated to security, so you are starting at the beginning. You hold a meeting
and are discussing the main functions and features of network security. One of your assistants
asks what the function of Authentication in network security is. Which of the following best
describes Authentication?

Which of the following best describes Confidentiality?

You have been hired at a large company to manage network security issues. Prior to your arrival,
there was no one dedicated to security, so you are starting at the beginning. You hold a meeting
and are discussing the main functions and features of network security. One of your assistants
asks what the function of Confidentiality in network security is. Which of the following best
describes Confidentiality?


Page 4 of 24« First...23456...1020...Last »