Which of the following could the security administrator implement to reduce the risk associated with the finding?

A security administrator has been tasked with improving the overall security posture related to desktop machines on the network. An auditor has recently that several machines with confidential customer information displayed in the screens are left unattended during the course of the day. Which of the following could the security...

August 10, 2018 No Comments READ MORE +

Which of the following is a deployment model that would help the company overcome these problems?

A company is using a mobile device deployment model in which employees use their personal devices for work at their own discretion. Some of the problems the company is encountering include the following: * There is no standardization. * Employees ask for reimbursement for their devices. * Employees do not...

August 8, 2018 No Comments READ MORE +

Which of the following summarizes the BEST response to the programmer's proposal?

A software development company needs to share information between two remote servers, using encryption to protect it. A programmer suggests developing a new encryption protocol, arguing that using an unknown protocol with secure, existing cryptographic algorithm libraries will provide strong encryption without being susceptible to attacks on other known protocols....

August 6, 2018 No Comments READ MORE +

Drag and Drop Question

Drag and Drop Question A security administrator is given the security and availability profiles for servers that are being deployed. 1) Match each RAID type with the correct configuration and MINIMUM number of drives. 2) Review the server profiles and match them with the appropriate RAID type based on integrity,...

August 2, 2018 No Comments READ MORE +

Which of the following describes the case in which the tool incorrectly identifies the vulnerability?

An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?A . False negativeB . True negativeC . False positiveD . True positiveView AnswerAnswer: C

August 2, 2018 No Comments READ MORE +

Which of the following is the BEST solution for this organization?

An organization finds that most help desk calls ate regarding account lockout due to a variety of applications running on different systems. Manager is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?A ....

August 2, 2018 No Comments READ MORE +

Which of the following would correct the deficiencies?

A security administrator has been assigned to review the security posture of the standard corporate system image for virtual machines. The security administrator conducts a thorough review of the system logs, installation procedures, and network configuration of the VM image. Upon reviewing the access logs and user accounts, the security...

August 2, 2018 No Comments READ MORE +

If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery?

A database backup schedule consists of weekly full backups performed on Saturday at 12:00 A.m. and daily differential backups also performed at 12:00 A.m. If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete...

July 28, 2018 No Comments READ MORE +

Which of the following should identify critical systems and components?

Which of the following should identify critical systems and components?A . MOUB . BPAC . ITCPD . BCPView AnswerAnswer: D

July 20, 2018 No Comments READ MORE +

Which of the following is being used?

A technician has installed new vulnerability scanner software on a server that is joined to the company domain. The vulnerability scanner is able to provide visibility over the patch posture of all company's clients. Which of the following is being used?A . Gray box vulnerability testingB . Passive scanC ....

July 18, 2018 No Comments READ MORE +