Question.16 Which application type is considered high risk and provides a common way for malware and viruses to enter a network? (A) Instant messaging or chat applications (B) Peer-to-Peer (P2P) file sharing applications (C) E-mail applications (D) End-to-end applications |
16. Click here to View Answer
Correct Answer: B
Question.17 An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked? (A) 0 (B) 1 (C) 2 (D) 3 |
17. Click here to View Answer
Correct Answer: B
Question.18 Which of the following is the BEST way to protect an organization’s data assets? A. Encrypt data in transit and at rest using up-to-date cryptographic algorithms. B. Monitor and enforce adherence to security policies. C. Require Multi-Factor Authentication (MFA) and Separation of Duties (SoD). D. Create the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts. |
18. Click here to View Answer
Correct Answer: B
Question.19 Within a large organization, what business unit is BEST positioned to initiate provisioning and deprovisioning of user accounts? (A) Training department (B) Internal audit (C) Human resources (D) Information technology (IT) |
19. Click here to View Answer
Correct Answer: C
Question.20 Which of the following is the PRIMARY purpose of installing a mantrap within a facility? (A) Control traffic (B) Control air flow (C) Prevent piggybacking (D) Prevent rapid movement |
20. Click here to View Answer
Correct Answer: C