1. Company policy requires the use if passphrases instead if passwords. Which of the following technical controls MUST be in place in order to promote the use of passphrases?
A) History B) Length C) Reuse D) Complexity
2. Management wishes to add another authentication factor in addition to fingerprints and passwords in order to have three-factor authentication. Which of the following would BEST satisfy this request?
A) Token fob B) Passphrase C) Retinal scan D) Security question
3. Company A has acquired Company B. Company A has different domains spread globally,and typically migrates its acquisitions infrastructure under its own domain infrastructure. Company B,however,cannot be merged into Company A's domain infrastructure. Which of the following methods would allow the two companies to access one another's resources?
A) Attestation B) Single sign-on C) Federation D) Kerberos
4. A stock trading company had the budget for enhancing its secondary datacenter approved. Since the main site is a hurricane-affected area and the disaster recovery site is 100 mi (161 km) away,the company wants to ensure its business is always operational with the least amount of man hours needed. Which of the following types of disaster recovery sites should the company implement?
A) Cloud-based site B) Cold site C) Warm site D) Hot site
5. Joe,a technician,is working remotely with his company provided laptop at the coffee shop near his home. Joe is concerned that another patron of the coffee shop may be trying to access his laptop. Which of the following is an appropriate control to use to prevent the other patron from accessing Joe's laptop directly?
A) Host-based firewall B) full-disk encryption C) Current antivirus definitions D) Latest OS updates
Leave a comment