Who is responsible for initiating corrective measures and capabilities used when there are security violations?
Who is responsible for initiating corrective measures and capabilities used when there are security violations?A . Information systems auditorB . Security administratorC . ManagementD . Data ownersView AnswerAnswer: C Explanation: Management is responsible for protecting all assets that are directly or indirectly under their control. They must ensure that employees understand...
What should a compliance officer do during an ongoing investigation into a client’s activities by a competent authority?
What should a compliance officer do during an ongoing investigation into a client’s activities by a competent authority?A . Ensure communication with regulatory and law enforcement authorities is conducted only through the Board of DirectorsB . Communicate only in writing regulatory and law enforcement authorities in line with applicable local...
Compared with the X86 solutions, which is no charge for the IBM analysis can be used to illustrate the value of IBM POWER server?
Customers compare POWER8ystems programs and X86 Solution ability to solve big data analysis. Compared with the X86 solutions, which is no charge for the IBM analysis can be used to illustrate the value of IBM POWER server?A . WLE (Workload Estimator)B . Perfomance NavigatorC . Eagle StudyD . SPT (System...
Regarding licensing, which option will allow IKEv2 connections on the adaptive security appliance?
Regarding licensing, which option will allow IKEv2 connections on the adaptive security appliance?A . AnyConnect Essentials can be used for Cisco AnyConnect IKEv2 connections.B . IKEv2 sessions are not licensed.C . The Advanced Endpoint Assessment license must be installed to allow Cisco AnyConnect IKEv2 sessions.D . Cisco AnyConnect Mobile must...
Which is a key benefit of Data Governance?
Which is a key benefit of Data Governance?A . Consolidating all business critical data into a single repository for ease of accessB . Defensible disposal of unnecessary dataC . Removal of all personally identifiable information from all repositoriesD . Never managing data longer than 5 yearsView AnswerAnswer: B
Which two nodes should you configure in File Server Resource Manager?
HOTSPOT You have a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a file share that must be accessed by only a limited number of users. You need to ensure that if an unauthorized user attempts to access the file share, a custom access-denied message appears,...
The end result of implementing the principle of least privilege means which of the following?
The end result of implementing the principle of least privilege means which of the following?A . Users would get access to only the info for which they have a need to knowB . Users can access all systems.C . Users get new privileges added when they change positions.D . Authorization...
What should you do from Active Directory Users and Computers?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol...
Which tool should be used to analyze the file?
The customer has an IBM Storwize V7000 storage system in place and wants to add additional workload. The customer used IBM Spectrum Control to generate a performance information file and requested that you analyze the information and report your findings. Which tool should be used to analyze the file?A ....
What should you do?
Your network contains an Active Directory domain named contoso.com. You have a Group Policy object (GPO) named GP1 that is linked to the domain. GP1 contains a software restriction policy that blocks an application named App1. You have a workgroup computer named Computer1 that runs Windows 8. A local Group...