1.
You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution?
A. 
B. 
Encrypt it before sending.
C. 
Protect it with a digital signature.
D. 
2.
Apu manages network devices in his store and maintains copies of the configuration files for all the managed routers and switches. On a weekly basis, he creates hashes for these files and compares them with hashes he created on the same files the previous week. Which of the following use cases is the MOST likely using?
A. 
Supporting confidentiality
B. 
C. 
D. 
3.
Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following BEST describes the purpose of his actions?
A. 
B. 
C. 
D. 
4.
Management has mandated the use of digital signatures by all personnel within your organization. Which of the following use cases does this primarily support?
A. 
Supporting confidentiality
B. 
C. 
D. 
Supporting non-repudiation
5.
As the CTO, Marge is implementing a security program. She has included security controls to address confidentiality and availability. Of the following choices, what else should she include?
A. 
Ensure critical systems provide uninterrupted service.
B. 
Protect data-in-transit from unauthorized disclosure.
C. 
Ensure systems are not susceptible to unauthorized changes.
D. 
Secure data to prevent unauthorized disclosure.
6.
Your organization wants to reduce the amount of money it is losing due to thefts. Which of the following is the BEST example of an equipment theft deterrent?
A. 
B. 
C. 
D. 
7.
Your organization is considering virtualization solutions. Management wants to ensure that any solution provides the best ROI. Which of the following situations indicates that virtualization would provide the best ROI?
A. 
Most physical servers within the organization are currently utilized at close to 100 percent.
B. 
The organization has many servers that do not require failover services.
C. 
Most desktop PCs require fast processors and a high amount of memory.
D. 
Most physical servers within the organization are currently underutilized.
8.
You are preparing to deploy a new application on a virtual server. The virtual server hosts another server application that employees routinely access. Which of the following is the BEST method to use when deploying the new application?
A. 
Take a snapshot of the VM before deploying the new application.
B. 
Take a snapshot of the VM after deploying the new application.
C. 
Ensure the server is configured for non-persistence.
D. 
Back up the server after installing the new application.
9.
Ned is not able to access any network resources from his Linux-based computer. Which of the following commands would he use to view the network configuration of his system?
A. 
B. 
C. 
D. 
10.
Administrators frequently create VMs for testing. They sometimes leave these running without using them again after they complete their tests. Which of the following does this describe?
A. 
B. 
C. 
D. 
11.
Users within your organization access virtual desktops hosted on remote servers. This describes which of the following?
A. 
B. 
Snapshots for non-persistence
C. 
D. 
12.
Your organization has implemented a VDI for most users. When a user logs off, the desktop reverts to its original state without saving any changes made by the user. Which of the following BEST describes this behavior?
A. 
B. 
C. 
D. 
13.
Which type of virtualization allows a computer’s operating system kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the kernel?
A. 
B. 
Type I hypervisor virtualization
C. 
Type II hypervisor virtualization
D. 
14.
You are considering rebooting a database server and want to identify if it has any active network connections. Which of the following commands will list active network connections?
A. 
B. 
C. 
D. 
15.
You have configured a firewall in your network to block ICMP traffic. You want to verify that it is blocking this traffic. Which of the following commands would you use?
A. 
B. 
C. 
D. 
16.
Developers in your organization have created an application designed for the sales team. Salespeople can log on to the application using a simple password of 1234. However, this password does not meet the organization’s password policy. Which of the following is the BEST response by the security administrator after learning about this?
A. 
Nothing. Strong passwords aren’t required in applications.
B. 
Modify the security policy to accept this password.
C. 
Document this as an exception in the application’s documentation.
D. 
Direct the application team manager to ensure the application
adheres to the organization’s password policy.
17.
Ned is reviewing password security for employees of The Leftorium. The password policy has the following settings:
• The password maximum age is 30 days.
• The password minimum length is 14 characters.
• Passwords cannot be reused until five other passwords have been used.
• Passwords must include at least one of each of the following four character types: uppercase letters,
lowercase letters, numbers, and special characters.
Ned discovers that despite having this password policy in place, users are still using the same password that they were using more than a month ago. Which of the following actions will resolve this issue?
A. 
Create a rule in the password policy for the password minimum
age to be 7 days.
B. 
Change the password history to 10.
C. 
Require the use of complex passwords.
D. 
Change the maximum age setting to 60 days.
18.
Your organization is planning to implement remote access capabilities. Management wants strong authentication and wants to ensure that passwords expire after a predefined time interval. Which of the following choices BEST meets this requirement?
A. 
B. 
C. 
D. 
19.
Your organization has decided to implement a biometric solution for authentication. One of the goals is to ensure that the biometric system is highly accurate. Which of the following provides the BEST indication of accuracy with the biometric system?
A. 
B. 
C. 
D. 
20.
Your organization recently updated an online application that employees use to log on when working from home. Employees enter their username and password into the application from their smartphone and the application logs their location using GPS. Which type of authentication is being used?
A. 
B. 
C. 
D. 
21.
A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?
A. 
B. 
C. 
D. 
22.
Lisa is a training instructor and she maintains a training lab with 18 computers. She has enough rights and permissions on these machines so that she can configure them as needed for classes. However, she does not have the rights to add them to the organization’s domain. Which of the following choices BEST describes this example?
A. 
B. 
C. 
D. 
23.
Marge is reviewing an organization’s account management processes. She wants to ensure that security log entries accurately report the identity of personnel taking specific actions. Which of the following steps would BEST meet this requirement?
A. 
Update ACLs for all files and folders.
B. 
Implement role-based privileges.
C. 
D. 
Remove all shared accounts.
24.
A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. Which of the following is the BEST response to this situation?
A. 
Remove the account expiration from the accounts.
B. 
C. 
D. 
25.
Members of a project team chose to meet at a local library to complete some work on a key project. All of them are authorized to work from home using a VPN connection and have connected from home successfully. However, they found that they were unable to connect to the network using the VPN from the library and they could not access any of the project data. Which of the following choices is the MOST likely reason why they can’t access this data?
A. 
Role-based access control
B. 
Time-of-day access control
C. 
D. 
Discretionary access control