What is the PRIMARY goal of fault tolerance?

What is the PRIMARY goal of fault tolerance?A . Elimination of single point of failureB . Isolation using a sandboxC . Single point of repairD . Containment to prevent propagationView AnswerAnswer: A

July 19, 2020 No Comments READ MORE +

Why did the network architect likely design the VoIP system with gratuitous ARP disabled?

A post-implementation review has identified that the Voice Over Internet Protocol (VoIP) system was designed to have gratuitous Address Resolution Protocol (ARP) disabled. Why did the network architect likely design the VoIP system with gratuitous ARP disabled?A . Gratuitous ARP requires the use of Virtual Local Area Network (VLAN) 1.B...

July 19, 2020 No Comments READ MORE +

Which of the following represents the GREATEST risk to data confidentiality?

Which of the following represents the GREATEST risk to data confidentiality?A . Network redundancies are not implementedB . Security awareness training is not completedC . Backup tapes are generated unencryptedD . Users have administrative privilegesView AnswerAnswer: C

July 18, 2020 No Comments READ MORE +

Which of the following is the MOST appropriate action when reusing media that contains sensitive data?

Which of the following is the MOST appropriate action when reusing media that contains sensitive data?A . EraseB . SanitizeC . EncryptD . DegaussView AnswerAnswer: B

July 18, 2020 No Comments READ MORE +

What is the MOST important consideration from a data security perspective when an organization plans to relocate?

What is the MOST important consideration from a data security perspective when an organization plans to relocate?A . Ensure the fire prevention and detection systems are sufficient to protect personnelB . Review the architectural plans to determine how many emergency exits are presentC . Conduct a gap analysis of a...

July 18, 2020 No Comments READ MORE +

Which access control mechanism would be preferred?

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover. Which access control mechanism would be preferred?A . Attribute Based Access Control (ABAC)B . Discretionary Access Control (DAC)C . Mandatory Access Control (MAC)D . Role-Based Access Control (RBAC)View AnswerAnswer: D

July 18, 2020 No Comments READ MORE +

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?A . Transport layer handshake compressionB . Application layer negotiationC . Peer identity authenticationD . Digital certificate revocationView AnswerAnswer: C

July 17, 2020 No Comments READ MORE +

Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?

Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?A . Use Software as a Service (SaaS)B . Whitelist input validationC . Require client certificatesD . Validate data outputView AnswerAnswer: B

July 17, 2020 No Comments READ MORE +

Which of the following is MOST suited to quickly implement a control?

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?A . Add a new rule to the application layer firewallB . Block access to the serviceC . Install an Intrusion Detection System (IDS)D...

July 17, 2020 No Comments READ MORE +

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs? A . Modifying source code without approval B . Promoting programs to production without approval C . Developers checking out source code without approval D . Developers using Rapid Application Development (RAD) methodologies without approval View...

July 17, 2020 No Comments READ MORE +