Tyler Hampton
Quiz von , erstellt am more than 1 year ago

Given a scenario, implement appropriate risk mitigation strategies.

12
0
0
Tyler Hampton
Erstellt von Tyler Hampton vor mehr als 6 Jahre
Schließen

S+ Objective 2.3 Quiz

Frage 1 von 6

1

A network administrator needs to update the operating system on switches used within the network. Assuming the organization is following standard best practices, what should the administrator do first?

Wähle eine der folgenden:

  • Submit a request using the baseline configuration process.

  • Submit a request using the incident management process.

  • Submit a request using the change management process.

  • Submit a request using the application patch management process.

Erklärung

Frage 2 von 6

1

Management wants to ensure that employees do not print any documents that include customer PII. Which of the following solutions would meet this goal?

Wähle eine der folgenden:

  • HSM

  • TPM

  • VLAN

  • DLP

Erklärung

Frage 3 von 6

1

Security administrators have recently implemented several security controls to enhance the network's security posture. Management wants to ensure that these controls continue to function as intended. Which of the following tools is the BEST choice to meet this goal?

Wähle eine der folgenden:

  • Routine Audit

  • Change Management

  • Design Review

  • Black Box Test

Erklärung

Frage 4 von 6

1

Your organization recently hired an outside security auditor to review internal processes. The auditor identified several employees who had permissions for previously held jobs within the company. What should the organization implement to prevent this in the future?

Wähle eine der folgenden:

  • Design Reviews

  • Code Reviews

  • Baseline Review

  • User Rights and Permissions Reviews

Erklärung

Frage 5 von 6

1

Your organization's security policy states that administrators should follow the principle of least privilege. Which of the following tools can ensure that administrators are following the policy?

Wähle eine der folgenden:

  • Users Rights and Permissions Reviews

  • Risk Assessment

  • Vulnerability Assessment

  • Threat Assessment

Erklärung

Frage 6 von 6

1

Management within your organization wants to limit documents copied to USB flash drives. Which of the following can be used to meet this goal?

Wähle eine der folgenden:

  • DLP

  • Content Filtering

  • IPS

  • Logging

Erklärung