Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Professional Certification
CASP ? 121-150
30 Questions
|
By Bcorazza | Updated: Dec 18, 2013
| Attempts: 283
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 30
0 %
0/100
Score
0/100
1.
127. A storage administrator would like to make storage available to some hosts and unavailable to other hosts. Which of the following would be used?
LUN masking
Deduplication
Multipathing
Snapshots
Submit
Start Quiz
About This Quiz
Casp? 121-150
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
124. During a specific incident response and recovery process action, the response team determines that it must first speak to the person ultimately responsible for the data. With whom should the response team speak FIRST?
Data User
Data Owner
Business Owner
Data Custodian
Submit
3.
122. A new vendor product has been acquired to replace a legacy perimeter security product. There are significant time constraints due to the existing solution nearing end-of-life with no options for extended support. It has been emphasized that only essential activities be performed. Which of the following sequences BEST describes the order of activities when balancing security posture and time constraints?
Install the new solution, migrate to the new solution, and test the new solution.
Purchase the new solution, test the new solution, and migrate to the new solution.
Decommission the old solution, install the new solution, and test the new solution.
Test the new solution, migrate to the new solution, and decommission the old solution.
Submit
4.
131. A company has a legacy virtual cluster which was added to the datacenter after a small company was acquired. All VMs on the cluster use the same virtual network interface to connect to the corporate data center LAN. Some of the virtual machines on the cluster process customer data, some process company financial data, and others act as externally facing web servers. Which of the following security risks can result from the configuration in this scenario?
Visibility on the traffic between the virtual machines can impact confidentiality
NIC utilization can exceed 50 percent and impact availability
Shared virtual switches can negatively impact the integrity of network packets
Additional overhead from network bridging can affect availability
Submit
5.
137. The increasing complexity of attacks on corporate networks is a direct result of more and more corporate employees connecting to corporate networks with mobile and personal devices. In most cases simply banning these connections and devices is not practical because they support necessary business needs. Which of the following are typical risks and mitigations associated with this new trend?
Risks: Data leakage, lost data on destroyed mobile devices, smaller network attack surface,prohibitive telecommunications costsMitigations: Device Encryptions, lock screens, certificate...
Risks: Data leakage, lost data on destroyed mobile devices, smaller network attack surface,prohibitive telecommunications costsMitigations: Device Encryptions, lock screens, certificate based authentication, corporate telecomplans
Risks: Confidentiality leaks through cell conversations, availability of remote corporate data,integrity of data stored on the devicesMitigations: Cellular privacy extensions,...
Risks: Confidentiality leaks through cell conversations, availability of remote corporate data,integrity of data stored on the devicesMitigations: Cellular privacy extensions, mobile VPN clients, over-the-air backups.
Risks: Data exfiltration, loss of data via stolen mobile devices, increased data leakage at thenetwork edgeMitigations: Remote data wipe capabilities,...
Risks: Data exfiltration, loss of data via stolen mobile devices, increased data leakage at thenetwork edgeMitigations: Remote data wipe capabilities, implementing corporate security on personally owneddevices
Risks: Theft of mobile devices, unsanctioned applications, minimal device storage, call qualityMitigations: GPS tracking, centralized approved application deployment, over-the-air backups,QoS...
Risks: Theft of mobile devices, unsanctioned applications, minimal device storage, call qualityMitigations: GPS tracking, centralized approved application deployment, over-the-air backups,QoS implementation
Submit
6.
133. An administrator is troubleshooting availability issues on a FCoE based storage array that uses deduplication. An administrator has access to the raw data from the SAN and wants to restore the data to different hardware. Which of the following issues may potentially occur?
The existing SAN may be read-only.
The existing SAN used LUN masking.
The new SAN is not FCoE based.
The data may not be in a usable format.
Submit
7.
143. A bank has just outsourced the security department to a consulting firm, but retained the security architecture group. A few months into the contract the bank discovers that the consulting firm has sub-contracted some of the security functions to another provider. Management is pressuring the sourcing manager to ensure adequate protections are in place to insulate the bank from legal and service exposures. Which of the following is the MOST appropriate action to take?
Directly establish another separate service contract with the sub-contractor to limit the riskexposure and legal implications.
Ensure the consulting firm has service agreements with the sub-contractor; if the agreementdoes not exist, exit the contract when possible.
Log it as a risk in the business risk register and pass the risk to the consulting firm foracceptance and...
Log it as a risk in the business risk register and pass the risk to the consulting firm foracceptance and responsibility.
Terminate the contract immediately and bring the security department in-house again to reducelegal and regulatory exposure.
Submit
8.
Company XYZ has invested an increasing amount in security due to the changing threat landscape. The company is going through a cost cutting exercise and the Chief Financial Officer (CFO) has queried the security budget allocated to the Chief Information Security Officer (CISO). At the same time, the CISO is actively promoting business cases for additional funding to support new initiatives. These initiatives will mitigate several security incidents that have occurred due to ineffective controls. A security advisor is engaged to assess the current controls framework and to provide recommendations on whether preventative, detective, or corrective controls should be implemented. How should the security advisor respond when explaining which controls to implement?
Preventative controls are useful before an event occurs, detective controls are useful during anevent, and corrective controls are useful after...
Preventative controls are useful before an event occurs, detective controls are useful during anevent, and corrective controls are useful after an event has occurred. A combination of controlscan be used.
Corrective controls are more costly to implement, but are only needed for real attacks or highvalue assets; therefore, controls should...
Corrective controls are more costly to implement, but are only needed for real attacks or highvalue assets; therefore, controls should only be put in place after a real attack has occurred.
Detective controls are less costly to implement than preventative controls; therefore, theyshould be encouraged wherever possible. Corrective controls are used...
Detective controls are less costly to implement than preventative controls; therefore, theyshould be encouraged wherever possible. Corrective controls are used during an event or securityincident. Preventative controls are hard to achieve in practice due to current market offerings.
Always advise the use of preventative controls as this will prevent security incidents fromoccurring in the first place. Detective and...
Always advise the use of preventative controls as this will prevent security incidents fromoccurring in the first place. Detective and corrective controls are redundant compensating controlsand are not required if preventative controls are implemented.
Submit
9.
128. Which of the following is a security advantage of single sign-on? (Select TWO).
Users only have to remember one password.
Applications need to validate authentication tokens.
Authentication is secured by the certificate authority.
Less time and complexity removing user access.
All password transactions are encrypted.
Submit
10.
147. A newly-hired Chief Information Security Officer (CISO) is faced with improving security for a company with low morale and numerous disgruntled employees. After reviewing the situation for several weeks the CISO publishes a more comprehensive security policy with associated standards. Which of the following issues could be addressed through the use of technical controls specified in the new security policy?
Employees publishing negative information and stories about company management on socialnetwork sites and blogs.
An employee remotely configuring the email server at a relative’s company during work hours.
Employees posting negative comments about the company from personal phones and PDAs.
External parties cloning some of the company’s externally facing web pages and creating lookalikesites.
Submit
11.
132. A user on a virtual machine downloads a large file using a popular peer-to-peer torrent program. The user is unable to execute the program on their VM. A security administrator scans the VM and detects a virus in the program. The administrator reviews the hypervisor logs and correlates several access attempts to the time of execution of the virus. Which of the following is the MOST likely explanation for this behavior?
The hypervisor host does not have hardware acceleration enabled and does not allow DEP.
The virus scanner on the VM changes file extensions of all programs downloaded via P2P toprevent execution.
The virtual machine is configured to require administrator rights to execute all programs.
The virus is trying to access a virtual device which the hypervisor is configured to restrict.
Submit
12.
130. Company A is purchasing Company B, and will import all of Company B's users into its authentication system. Company A uses 802.1x with a RADIUS server, while Company B uses a captive SSL portal with an LDAP backend. Which of the following is the BEST way to integrate these two networks?
Enable RADIUS and end point security on Company B’s network devices.
Enable LDAP authentication on Company A’s network devices.
Enable LDAP/TLS authentication on Company A’s network devices.
Enable 802.1x on Company B’s network devices.
Submit
13.
123. Within an organization, there is a known lack of governance for solution designs. As a result there are inconsistencies and varying levels of quality for the artifacts that are produced. Which of the following will help BEST improve this situation?
Ensure that those producing solution artifacts are reminded at the next team meeting thatquality is important.
Introduce a peer review process that is mandatory before a document can be officially madefinal.
Introduce a peer review and presentation process that includes a review board withrepresentation from relevant disciplines.
Ensure that appropriate representation from each relevant discipline approves of the solutiondocuments before official approval.
Submit
14.
141. Company XYZ is selling its manufacturing business consisting of one plant to a competitor, Company QRS. All of the people will become QRS employees, but will retain permissions to plantspecific information and resources for one month. To ease the transition, Company QRS also connected the plant and employees to the Company QRS network. Which of the following threats is the HIGHEST risk to Company XYZ?
Malware originating from Company XYZ’s network
Co-mingling of company networks
Lack of an IPSec connection between the two networks
Loss of proprietary plant information
Submit
15.
The new security policy states that only authorized software will be allowed on the corporate network and all personally owned equipment needs to be configured by the IT security staff before being allowed on the network. The security administrator creates standard images with all the required software and proper security controls. These images are required to be loaded on all personally owned equipment prior to connecting to the corporate network. These measures ensure compliance with the new security policy. Which of the following security risks still needs to be addressed in this scenario?
An employee copying gigabytes of personal video files from the employee’s personal laptop totheir company desktop to share files.
An employee connecting their personal laptop to use a non-company endorsed accountingapplication that the employee used at a previous company.
An employee using a corporate FTP application to transfer customer lists and other proprietaryfiles to an external computer and selling...
An employee using a corporate FTP application to transfer customer lists and other proprietaryfiles to an external computer and selling them to a competitor.
An employee accidentally infecting the network with a virus by connecting a USB drive to theemployee’s personal laptop.
Submit
16.
146. A new malware spreads over UDP Port 8320 and several network hosts have been infected. A new security administrator has determined a possible cause, and the infected machines have been quarantined. Which of the following actions could a new security administrator take to further mitigate this issue?
Limit source ports on the firewall to specific IP addresses.
Add an explicit deny-all and log rule as the final entry of the firewall rulebase.
Implement stateful UDP filtering on UDP ports above 1024.
Configure the firewall to use IPv6 by default.
Submit
17.
121. A software vendor has had several zero-day attacks against its software, due to previously unknown security defects being exploited by attackers. The attackers have been able to perform operations at the same security level as the trusted application. The vendor product management team has decided to re-design the application with security as a priority. Which of the following is a design principle that should be used to BEST prevent these types of attacks?
Application sandboxing
Input validation
Penetration testing
Code reviews
Submit
18.
150. A company data center provides Internet based access to email and web services. The firewall is separated into four zones: RED ZONE is an Internet zone ORANGE ZONE a Web DMZ YELLOW ZONE an email DMZ GREEN ZONE is a management interface There are 15 email servers and 10 web servers. The data center administrator plugs a laptop into the management interface to make firewall changes. The administrator would like to secure this environment but has a limited budget. Assuming each addition is an appliance, which of the following would provide the MOST appropriate placement of security solutions while minimizing the expenses?
RED ZONE. noneORANGE ZONE. WAFYELLOW ZONE. SPAM FilterGREEN ZONE. none
RED ZONE. Virus Scanner, SPAM FilterORANGE ZONE. NIPSYELLOW ZONE. NIPSGREEN ZONE. NIPS
RED ZONE. WAF, Virus ScannerORANGE ZONE. NIPSYELLOW ZONE. NIPSGREEN ZONE. SPAM Filter
RED ZONE. NIPSORANGE ZONE. WAFYELLOW ZONE. Virus Scanner, SPAM FilterGREEN ZONE. none
Submit
19.
129. After a system update causes significant downtime, the Chief Information Security Officer (CISO) asks the IT manager who was responsible for the update. The IT manager responds that it is impossible to know who did the update since five different people have administrative access. How should the IT manager increase accountability to prevent this situation from reoccurring? (Select TWO).
Implement an enforceable change management system.
Implement a software development life cycle policy.
Enable user level auditing on all servers.
Implement a federated identity management system.
Configure automatic updates on all servers.
Submit
20.
125. A growing corporation is responding to the needs of its employees to access corporate email and other resources while traveling. The company is implementing remote access for company laptops. Which of the following security systems should be implemented for remote access? (Select TWO).
Virtual Private Network
Secure Sockets Layer for web servers
Network monitoring
Multifactor authentication for users
Full disk encryption
Intrusion detection systems
Submit
21.
145. There has been a recent security breach which has led to the release of sensitive customer information. As part of improving security and reducing the disclosure of customer data, a training company has been employed to educate staff. Which of the following should be the primary focus of the privacy compliance training program?
Explain how customer data is gathered, used, disclosed, and managed.
Remind staff of the company’s data handling policy and have staff sign an NDA.
Focus on explaining the “how” and “why” customer data is being collected.
Republish the data classification and the confidentiality policy.
Submit
22.
138. A security engineer at a major financial institution is prototyping multiple secure network configurations. The testing is focused on understanding the impact each potential design will have on the three major security tenants of the network. All designs must take into account the stringent compliance and reporting requirements for most worldwide financial institutions. Which of the following is the BEST list of security lifecycle related concerns related to deploying the final design?
Decommissioning the existing network smoothly, implementing maintenance and operationsprocedures for the new network in advance, and ensuring compliance with applicable...
Decommissioning the existing network smoothly, implementing maintenance and operationsprocedures for the new network in advance, and ensuring compliance with applicable regulationsand laws.
Interoperability with the Security Administration Remote Access protocol, integrity of the data atrest, overall network availability, and compliance with corporate...
Interoperability with the Security Administration Remote Access protocol, integrity of the data atrest, overall network availability, and compliance with corporate and government regulations andpolicies.
Resistance of the new network design to DDoS attacks, ability to ensure confidentiality of alldata in transit, security of change...
Resistance of the new network design to DDoS attacks, ability to ensure confidentiality of alldata in transit, security of change management processes and procedures, and resilience of thefirewalls to power fluctuations.
Decommissioning plan for the new network, proper disposal protocols for the existing networkequipment, transitioning operations to the new network on...
Decommissioning plan for the new network, proper disposal protocols for the existing networkequipment, transitioning operations to the new network on day one, and ensuring compliance withcorporate data retention policies.
Ensuring smooth transition of maintenance resources to support the new network, updating allwhole disk encryption keys to be compatible with...
Ensuring smooth transition of maintenance resources to support the new network, updating allwhole disk encryption keys to be compatible with IPv6, and maximizing profits for bankshareholders.
Submit
23.
134. The security administrator has noticed a range of network problems affecting the proxy server. Based on reviewing the logs, the administrator notices that the firewall is being targeted with various web attacks at the same time that the network problems are occurring. Which of the following strategies would be MOST effective in conducting an in-depth assessment and remediation of the problems?
1. Deploy an HTTP interceptor on the switch span port; 2. Adjust the external facing NIDS; 3.Reconfigure the firewall ACLs...
1. Deploy an HTTP interceptor on the switch span port; 2. Adjust the external facing NIDS; 3.Reconfigure the firewall ACLs to block the all traffic above port 2000; 4. Verify the proxy server isconfigured correctly and hardened; 5. Review the logs weekly in the future.
1. Deploy a protocol analyzer on the switch span port; 2. Adjust the internal HIDS; 3.Reconfigure the firewall ACLs to...
1. Deploy a protocol analyzer on the switch span port; 2. Adjust the internal HIDS; 3.Reconfigure the firewall ACLs to block outbound HTTP traffic; 4. Reboot the proxy server; 5.Continue to monitor the network.
1. Deploy a protocol analyzer on the switch span port; 2. Adjust the external facing IPS; 3.Reconfigure the firewall ACLs...
1. Deploy a protocol analyzer on the switch span port; 2. Adjust the external facing IPS; 3.Reconfigure the firewall ACLs to block unnecessary ports; 4. Verify the proxy server is configuredcorrectly and hardened; 5. Continue to monitor the network.
1. Deploy a network fuzzer on the switch span port; 2. Adjust the external facing IPS; 3.Reconfigure the proxy server...
1. Deploy a network fuzzer on the switch span port; 2. Adjust the external facing IPS; 3.Reconfigure the proxy server to block the attacks; 4. Verify the firewall is configured correctly andhardened.
Submit
24.
135. Company A is merging with Company B. Company B uses mostly hosted services from an outside vendor, while Company A uses mostly in-house products. The project manager of the merger states the merged systems should meet these goals: Ability to customize systems per department Quick implementation along with an immediate ROI The internal IT team having administrative level control over all products The project manager states the in-house services are the best solution. Because of staff shortages, the senior security administrator argues that security will be best maintained by continuing to use outsourced services. Which of the following solutions BEST solves the disagreement?
Raise the issue to the Chief Executive Officer (CEO) to escalate the decision to seniormanagement with the recommendation to continue...
Raise the issue to the Chief Executive Officer (CEO) to escalate the decision to seniormanagement with the recommendation to continue the outsourcing of all IT services.
Calculate the time to deploy and support the in-sourced systems accounting for the staffshortage and compare the costs to the...
Calculate the time to deploy and support the in-sourced systems accounting for the staffshortage and compare the costs to the ROI costs minus outsourcing costs. Present the documentnumbers to management for a final decision.
Perform a detailed cost benefit analysis of outsourcing vs. in-sourcing the IT systems andreview the system documentation to assess the...
Perform a detailed cost benefit analysis of outsourcing vs. in-sourcing the IT systems andreview the system documentation to assess the ROI of in-sourcing. Select COTS products toeliminate development time to meet the ROI goals.
Arrange a meeting between the project manager and the senior security administrator to reviewthe requirements and determine how critical all...
Arrange a meeting between the project manager and the senior security administrator to reviewthe requirements and determine how critical all the requirements are.
Submit
25.
139. The sales staff at a software development company has received the following requirements from a customer: "We need the system to notify us in advance of all software errors and report all outages". Which of the following BEST conveys these customer requirements to the software development team to understand and implement?
The system shall send a status message to a network monitoring console every five secondswhile in an error state and...
The system shall send a status message to a network monitoring console every five secondswhile in an error state and the system should email the administrator when the number of inputerrors exceeds five.
The system shall alert the administrator upon the loss of network communications and whenerror flags are thrown.
The system shall email the administrator when processing deviates from expected conditionsand the system shall send a heartbeat message to...
The system shall email the administrator when processing deviates from expected conditionsand the system shall send a heartbeat message to a monitoring console every second while innormal operations.
The system shall email the administrator when an error condition is detected and a flag isthrown and the system shall...
The system shall email the administrator when an error condition is detected and a flag isthrown and the system shall send an email to the administrator when network communications aredisrupted.
Submit
26.
148. A small company has recently placed a newly installed DNS server on the DMZ and wants to secure it by allowing Internet hosts to query the DNS server. Since the company deploys an internal DNS server, all DNS queries to that server coming from the company network should be blocked. An IT administrator has placed the following ACL on the company firewall: Testing shows that the DNS server in the DMZ is not working. Which of the following should the administrator do to resolve the problem?
Modify the SRC and DST ports of ACL 1
Modify the SRC IP of ACL 1 to 0.0.0.0/32
Modify the ACTION of ACL 2 to Permit
Modify the PROTO of ACL 1 to TCP
Submit
27.
126. In order to reduce cost and improve employee satisfaction, a large corporation has decided to allow personal communication devices to access email and to remotely connect to the corporate network. Which of the following security measures should the IT organization implement? (Select TWO).
A device lockdown according to policies
An IDS on the internal networks
A data disclosure policy
A privacy policy
Encrypt data in transit for remote access
Submit
28.
140. A programming team is deploying a new PHP module to be run on a Solaris 10 server with trusted extensions. The server is configured with three zones, a management zone, a customer zone, and a backend zone. The security model is constructed so that only programs in the management zone can communicate data between the zones. After installation of the new PHP module, which handles on-line customer payments, it is not functioning correctly. Which of the following is the MOST likely cause of this problem?
The PHP module is written to transfer data from the customer zone to the management zone,and then from the management...
The PHP module is written to transfer data from the customer zone to the management zone,and then from the management zone to the backend zone.
The iptables configuration is not configured correctly to permit zone to zone communicationsbetween the customer and backend zones.
The PHP module was installed in the management zone, but is trying to call a routine in thecustomer zone to...
The PHP module was installed in the management zone, but is trying to call a routine in thecustomer zone to transfer data directly to a MySQL database in the backend zone.
The ipfilters configuration is configured to disallow loopback traffic between the physical NICsassociated with each zone.
Submit
29.
149. An administrator would like to connect a server to a SAN. Which of the following processes would BEST allow for availability and access control?
Install a dual port HBA on the SAN, create a LUN on the server, and enable deduplication anddata snapshots.
Install a multipath LUN on the server with deduplication, and enable LUN masking on the SAN.
Install 2 LUNs on the server, cluster HBAs on the SAN, and enable multipath and datadeduplication.
Install a dual port HBA in the server; create a LUN on the SAN, and enable LUN masking andmultipath.
Submit
30.
142. Company ABC has grown yearly through mergers and acquisitions. This has led to over 200 internal custom web applications having standalone identity stores. In order to reduce costs and improve operational efficiencies a project has been initiated to implement a centralized security infrastructure. The requirements are as follows: Reduce costs Improve efficiencies and time to market Manageable Accurate identity information Standardize on authentication and authorization Ensure a reusable model with standard integration patterns Which of the following security solution options will BEST meet the above requirements? (Select THREE).
Build an organization-wide fine grained access control model stored in a centralized policy datastore.
Implement self service provisioning of identity information, coarse grained, and fine grainedaccess control.
Implement a web access control agent based model with a centralized directory modelproviding coarse grained access control and single sign-on...
Implement a web access control agent based model with a centralized directory modelproviding coarse grained access control and single sign-on capabilities.
Implement a web access controlled reverse proxy and centralized directory model providingcoarse grained access control and single sign-on capabilities.
Implement automated provisioning of identity information; coarse grained, and fine grainedaccess control.
Move each of the applications individual fine grained access control models into a centralizeddirectory with fine grained access control.
Implement a web access control forward proxy and centralized directory model, providingcoarse grained access control, and single sign-on capabilities.
Submit
View My Results
Related Quizzes
WSET (Wine & Spirit Education Test) Level 2 Practice Test
WSET (Wine & Spirit Education Test) Level 2 Practice Test
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
BCBA Exam Questions
BCBA Exam Questions
The Ultimate IAHCSMM Quiz: Questions & Answers
The Ultimate IAHCSMM Quiz: Questions & Answers
NSDC Certification Test
NSDC Certification Test
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (30)
Unanswered (
)
Answered (
)
127. A storage administrator would like to make storage available to...
124. During a specific incident response and recovery process action,...
122. A new vendor product has been acquired to replace a legacy...
131. A company has a legacy virtual cluster which was added to the...
137. The increasing complexity of attacks on corporate networks is a...
133. An administrator is troubleshooting availability issues on a FCoE...
143. A bank has just outsourced the security department to a...
Company XYZ has invested an increasing amount in security due to the...
128. Which of the following is a security advantage of single sign-on?...
147. A newly-hired Chief Information Security Officer (CISO) is faced...
132. A user on a virtual machine downloads a large file using a...
130. Company A is purchasing Company B, and will import all of Company...
123. Within an organization, there is a known lack of governance for...
141. Company XYZ is selling its manufacturing business consisting of...
The new security policy states that only authorized software will be...
146. A new malware spreads over UDP Port 8320 and several network...
121. A software vendor has had several zero-day attacks against its...
150. A company data center provides Internet based access to email and...
129. After a system update causes significant downtime, the Chief...
125. A growing corporation is responding to the needs of its employees...
145. There has been a recent security breach which has led to the...
138. A security engineer at a major financial institution is...
134. The security administrator has noticed a range of network...
135. Company A is merging with Company B. Company B uses mostly hosted...
139. The sales staff at a software development company has received...
148. A small company has recently placed a newly installed DNS server...
126. In order to reduce cost and improve employee satisfaction, a...
140. A programming team is deploying a new PHP module to be run on a...
149. An administrator would like to connect a server to a SAN. Which...
142. Company ABC has grown yearly through mergers and acquisitions....
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement