Tyler Hampton
Quiz by , created more than 1 year ago

Given a scenario, implement appropriate risk mitigation strategies.

12
0
0
Tyler Hampton
Created by Tyler Hampton over 6 years ago
Close

S+ Objective 2.3 Quiz

Question 1 of 6

1

A network administrator needs to update the operating system on switches used within the network. Assuming the organization is following standard best practices, what should the administrator do first?

Select one of the following:

  • Submit a request using the baseline configuration process.

  • Submit a request using the incident management process.

  • Submit a request using the change management process.

  • Submit a request using the application patch management process.

Explanation

Question 2 of 6

1

Management wants to ensure that employees do not print any documents that include customer PII. Which of the following solutions would meet this goal?

Select one of the following:

  • HSM

  • TPM

  • VLAN

  • DLP

Explanation

Question 3 of 6

1

Security administrators have recently implemented several security controls to enhance the network's security posture. Management wants to ensure that these controls continue to function as intended. Which of the following tools is the BEST choice to meet this goal?

Select one of the following:

  • Routine Audit

  • Change Management

  • Design Review

  • Black Box Test

Explanation

Question 4 of 6

1

Your organization recently hired an outside security auditor to review internal processes. The auditor identified several employees who had permissions for previously held jobs within the company. What should the organization implement to prevent this in the future?

Select one of the following:

  • Design Reviews

  • Code Reviews

  • Baseline Review

  • User Rights and Permissions Reviews

Explanation

Question 5 of 6

1

Your organization's security policy states that administrators should follow the principle of least privilege. Which of the following tools can ensure that administrators are following the policy?

Select one of the following:

  • Users Rights and Permissions Reviews

  • Risk Assessment

  • Vulnerability Assessment

  • Threat Assessment

Explanation

Question 6 of 6

1

Management within your organization wants to limit documents copied to USB flash drives. Which of the following can be used to meet this goal?

Select one of the following:

  • DLP

  • Content Filtering

  • IPS

  • Logging

Explanation