2. A company wants to implement an access management solution that allows employees to use the same usernames and passwords for multiple applications without having to keep multiple credentials synchronized. Which of the following solutions would BEST meet these requirements?
A) Federation B) SSO C) Multifactor authentication D) Biometrics E) PKI
3. After a recent internal breach,a company decided to regenerate and reissue all certificates used in the transmission of confidential information. The company places the greatest importance on confidentiality and non-repudiation,and decided to generate dual key pairs for each client. Which of the following BEST describes how the company will use these certificates?
A) One key pair will be used for internal communication,and the other will be used for external communication. B) Data will be encrypted once by each key,doubling the confidentiality and non-repudiation strength. C) One key pair will be used for encryption. The other key pair will provide extended validation. D) One key pair will be used for encryption and decryption. The other will be used to digitally sign the data.
4. A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring?
A) Time-of-day restrictions B) Permission auditing and review C) Account expiration D) Offboarding
5. A company is performing an analysis of which corporate units are most likely to cause revenue loss in the event the unit is unable to operate. Which of the following is an element of the BIA that this action is addressing?
A) Continuity of operations B) Critical system inventory C) Mission-essential functions D) Single point of failure
Leave a comment