Where do you find the information your CISO is interested in seeing?

Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month. Where...

August 20, 2022 No Comments READ MORE +

What two steps are required before configuring the device policies?

A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices: - Control password policies. - Make corporate apps available to the users. - Remotely wipe the device if it's lost or compromised What...

August 20, 2022 No Comments READ MORE +

What should you do?

Your company recently migrated to G Suite and wants to deploy a commonly used third-party app to all of finance. Your OU structure in G Suite is broken down by department. You need to ensure that the correct users get this app. What should you do?A . For the Finance...

August 18, 2022 No Comments READ MORE +

What should you do?

Madeupcorp.com is in the process of migrating from a third-party email system to G Suite. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You...

August 18, 2022 No Comments READ MORE +

What should you do?

Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.”...

August 16, 2022 No Comments READ MORE +