What should you do?
You need to design a software usage policy for the employees of Southridge Video. The policy must meet business requirements. What should you do?
What should you do?
You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns.
What should you do?
What should you do?
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?
What should you do?
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?
What should you do?
You need to design a method to address the chief information officer’s security concerns.
What should you do?
What should you do?
You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?
What should you do?
You need to design an audit strategy for Southridge Video. Your solution must meet business requirements.
What should you do?
What should you do?
You need to design a monitoring strategy for the folders that contain customer information, which are shown in the Customer Data window.
What should you do?
What are two possible ways to achieve this goal?
You need to design a method to update the content on the Web server. Your solution must meet business and security requirements. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.(Choose two.)
What should you do?
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?