1. A security administrator wants sensitive data on corporate laptops and desktops to prevent leakage outside the corporate network. The company has already conducted a full-disk encryption and off all peripherals on desktops and laptops. Which of the following additional checks must be carried out to minimize the risk of data leakage? (Choose two).(Select 2answers)
A) Full VPN tunnel should be required for all network communications. B) Strong authentication is performed via external biometric devices. C) A DLP gateway should be installed now at the border. D) A full system backup should be a third-party provider with strong encryption for data in transit. E) Full-drive file hash be carried out with hashes stored on separate storage.
2. Accept only NTLM
A) None B) vTPM C) INE D) TPM E) HSM
3. The administrator resolve availability issues using FCoE storage array-based deduplication. The single controller fails in the storage array so that the administrator wants to drive to a storage array from another manufacturer to access the data. Which of the following problems may occur potential?
A) None B) The data may need a file system check. C) The data are not in a usable format. D) The new storage array also only one controller. E) The new storage array is not based FCoE.
4. After a security incident, an administrator would want policies that would help to implement to reduce fraud and the potential for collusion between employees. Which of the following would help to achieve these goals with colleagues and to monitor position of another employee?
A) Job rotation B) least privilege C) Separation of responsibilities D) None E) compulsory holiday
5. A security manager for a service provider has two approved suppliers to connect to the service provider backbone. One supplier will provide authentication services for payment card service, and the other vendor is providing service to the service provider infrastructure sites. Which of the following business agreements to the suppliers and service providerà ¬ YS relationship MOST relevant?
A) Interconnection Agreement Safety B) Non disclosure agreement C) None D) Operating Level Agreements E) Memorandum of Agreement
Leave a comment