Which of the following design objectives should the engineer complete to BEST mitigate the company’s concerns?

An engineer is assisting with the design of a new virtualized environment that will house critical company services and reduce the datacenter’s physical footprint. The company has expressed concern about the integrity of operating systems and wants to ensure a vulnerability exploited in one datacenter segment would not lead to...

January 2, 2019 No Comments READ MORE +

A security consultant is considering authentication options for a financial institution. The following authentication options are available security mechanism to the appropriate use case. Options may be used once

DRAG DROP A security consultant is considering authentication options for a financial institution. The following authentication options are available security mechanism to the appropriate use case. Options may be used once. View AnswerAnswer:

January 1, 2019 No Comments READ MORE +

Which of the following is the engineer implementing?

A server (10.0.0.2) on the corporate network is experiencing a DoS from a number of marketing desktops that have been compromised and are connected to a separate network segment. The security engineer implements the following configuration on the management router: Which of the following is the engineer implementing?A . Remotely...

December 28, 2018 No Comments READ MORE +

Which of the following commands would have provided this output?

A security consultant is attempting to discover if the company is utilizing databases on client machines to store the customer data. The consultant reviews the following information: Which of the following commands would have provided this output?A . arp -sB . netstat -aC . ifconfig -arpD . sqlmap -wView AnswerAnswer:...

December 26, 2018 No Comments READ MORE +

A security consultant is considering authentication options for a financial institution. The following authentication options are available security mechanism to the appropriate use case. Options may be used once

DRAG DROP A security consultant is considering authentication options for a financial institution. The following authentication options are available security mechanism to the appropriate use case. Options may be used once. View AnswerAnswer:

December 20, 2018 No Comments READ MORE +

Which of the following BEST represents a risk associated with merging two enterprises during an acquisition?

Which of the following BEST represents a risk associated with merging two enterprises during an acquisition?A . The consolidation of two different IT enterprises increases the likelihood of the data loss because there are now two backup systemsB . Integrating two different IT systems might result in a successful data...

December 20, 2018 No Comments READ MORE +

Which of the following solutions BEST balances security requirements with business need?

A security engineer is designing a system in which offshore, outsourced staff can push code from the development environment to the production environment securely. The security engineer is concerned with data loss, while the business does not want to slow down its development process. Which of the following solutions BEST...

December 20, 2018 No Comments READ MORE +

Which of the following would allow the organization to meet its requirement?

An engineer maintains a corporate-owned mobility infrastructure, and the organization requires that all web browsing using corporate-owned resources be monitored. Which of the following would allow the organization to meet its requirement? (Choose two.)A . Exempt mobile devices from the requirement, as this will lead to privacy violationsB . Configure...

December 15, 2018 No Comments READ MORE +

Using the table above, which of the following would be the BEST business-driven choice among five possible solutions?

After investigating virus outbreaks that have cost the company $1,000 per incident, the company’s Chief Information Security Officer (CISO) has been researching new antivirus software solutions to use and be fully supported for the next two years. The CISO has narrowed down the potential solutions to four candidates that meet...

December 11, 2018 No Comments READ MORE +