1. An organization is providing employees on the shop floor with computers that will log their time based on when they sign on and off the network. Which of the following account types should the employees receive?
A) Shared account B) Privileged account C) User account D) Service account
2. An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and requires significant overhead. Management would like to simplify the access control and provide user with the ability to determine what permissions should be applied to files,document,and directories. The access control method that BEST satisfies these objectives is:
A) Rule-based access control B) Role-based access control C) Mandatory access control D) Discretionary access control
3. An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?
A) False negative B) True negative C) False positive D) True positive
4. An organization is working with a cloud services provider to transition critical business applications to a hybrid cloud environment. The organization retains sensitive customer data and wants to ensure the provider has sufficient administrative and logical controls in place to protect its data. In which of the following documents would this concern MOST likely be addressed?
A) Service level agreement B) Interconnection security agreement C) Non-disclosure agreement D) Business process analysis
5. An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the security analyst recommend is lieu of an OCSP?
Leave a comment