EnsurepassQUESTION 1191 The security manager must store a copy of a sensitive document and needs to verify at a later point that the document has not been altered. Which of the following will accomplish the security manager's objective?   A. RSA B. AES C. MD5 D. SHA Correct Answer: C     QUESTION 1192 A security Operations Center was scanning a subnet for infections and found a contaminated machine. One of the administrators disabled the switch port that the machine was Read more [...]
EnsurepassQUESTION 1181 Which of the following authentication protocols makes use of UDP for its services?   A. RADIUS B. TACACS+ C. LDAP D. XTACACS   Correct Answer: A     QUESTION 1182 Which of the following is considered a risk management BEST practice of succession planning?   A. Reducing risk of critical information being known to an individual person who may leave the organization B. Implementing company-wide disaster recovery and business continuity Read more [...]
EnsurepassQUESTION 1171 A company's Chief Information Officer realizes the company cannot continue to operate after a disaster. Which of the following describes the disaster?   A. Risk B. Asset C. Threat D. Vulnerability   Correct Answer: C         QUESTION 1172 A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Read more [...]
EnsurepassQUESTION 1161 Several departments in a corporation have a critical need for routinely moving data from one system to another using removable storage devices. Senior management is concerned with data loss and the introduction of malware on the network. Which of the following choices BEST mitigates the range of risks associated with the continued use of removable storage devices?   A. Remote wiping enabled for all removable storage devices B. Full-disk encryption enabled for Read more [...]
EnsurepassQUESTION 1141 Ann, a security analyst, has discovered that her company has very high staff turnover and often user accounts are not disabled after an employee leaves the company. Which of the following could Ann implement to help identify accounts that are still active for terminated employees?   A. Routine audits B. Account expirations C. Risk assessments D. Change management   Correct Answer: A     QUESTION 1142 Joe must send Ann a message and provide Read more [...]
EnsurepassQUESTION 1151 An organization's security policy states that users must authenticate using something you do. Which of the following would meet the objectives of the security policy?   A. Fingerprint analysis B. Signature analysis C. Swipe a badge D. Password   Correct Answer: B     QUESTION 1152 Which of the following protocols is MOST likely to be leveraged by users who need additional information about another user?   A. LDAP B. RADIUS C. Read more [...]
EnsurepassQUESTION 1121 Which of the following would be MOST appropriate if an organization's requirements mandate complete control over the data and applications stored in the cloud?   A. Hybrid cloud B. Community cloud C. Private cloud D. Public cloud   Correct Answer: C     QUESTION 1122 Joe, the information security manager, is tasked with calculat ing risk and selecting controls to protect a new system. He has identified people, environmental conditions, and Read more [...]
EnsurepassQUESTION 1131 Ann has recently transferred from the payroll department to engineering. While browsing file shares, Ann notices she can access the payroll status and pay rates of her new coworkers. Which of the following could prevent this scenario from occurring?   A. Credential management B. Continuous monitoring C. Separation of duties D. User access reviews   Correct Answer: D     QUESTION 1132 A security administrator is tasked with ensuring that all Read more [...]
EnsurepassQUESTION 1111 Ann was reviewing her company's event logs and observed several instances of GUEST accessing the company print server, file server, and archive database. As she continued to investigate, Ann noticed that it seemed to happen at random intervals throughout the day, but mostly after the weekly automated patching and often logging in at the same time. Which of the following would BEST mitigate this issue?   A. Enabling time of day restrictions B. Disabling unnecessary Read more [...]
EnsurepassQUESTION 1101 Which of the following is the BEST reason for placing a password lock on a mobile device?   A. Prevents an unauthorized user from accessing owner's data B. Enables remote wipe capabilities C. Stops an unauthorized user from using the device again D. Prevents an unauthorized user from making phone calls   Correct Answer: A     QUESTION 1102 Joe is the accounts payable agent for ABC Company. Joe has been performing accounts payable function Read more [...]
EnsurepassQUESTION 1081 Which of the following is a directional antenna that can be used in point-to-point or point-to-multi- point WiFi communication systems? (Select TWO).   A. Backfire B. Dipole C. Omni D. PTZ E. Dish   Correct Answer: AE     QUESTION 1082 A large bank has moved back office operations offshore to another country with lower wage costs in an attempt to improve profit and productivity. Which of the following would be a customer concern if the Read more [...]