Why would the engineer suggest this?
John is a new network administrator. One of his engineers has put in a request to implement an ISDN line, but the company already has an established WAN link. Why would the engineer suggest this?
Which of the following controls would not be associated with personnel hiring?
Hiring new employees requires strict security controls that must be constantly reviewed and audited. Which of the following controls would not be associated with personnel hiring?
Which of the following is not one of them?
The removal of data remanence from media devices is a standard security measure in computing environments. This removal process has many names. Which of the following is not one of them?
Grouping disks or servers together to provide mutual support is called _________.
Grouping disks or servers together to provide mutual support is called _________.
what threat?
A media librarian keeps an updated log of authorized software versions installed on the company network. This control is used to protect against what threat?
Which of the following has an incorrect definition mapping?
Which of the following has an incorrect definition mapping?
Which of the following is not a detective control?
Detective controls are used to identify and react. Which of the following is not a detective control?
What type of control is the company implementing?
Employees are told that the use of e-mail can only be used for business purposes and their activities will be monitored. Violations will result in a verbal warning, then a written warning, and finally termination. What type of control is the company implementing?
what standard security principle?
Some organizations over-issue privileged access to ensure that users can have access to devices in emergency situations or unconventional scenarios. This practice violates what standard security principle?
What is this security violation known as?
Tara leaves her operations workstation when she is summoned by the front desk supervisor. In her rushed exit, Tara leaves her computer unlocked. Amy leans over and begins browsing through her personal folders and files. What is this security violation known as?