Tyler Hampton
Quiz por , criado more than 1 year ago

Given a scenario, implement appropriate risk mitigation strategies.

12
0
0
Tyler Hampton
Criado por Tyler Hampton mais de 6 anos atrás
Fechar

S+ Objective 2.3 Quiz

Questão 1 de 6

1

A network administrator needs to update the operating system on switches used within the network. Assuming the organization is following standard best practices, what should the administrator do first?

Selecione uma das seguintes:

  • Submit a request using the baseline configuration process.

  • Submit a request using the incident management process.

  • Submit a request using the change management process.

  • Submit a request using the application patch management process.

Explicação

Questão 2 de 6

1

Management wants to ensure that employees do not print any documents that include customer PII. Which of the following solutions would meet this goal?

Selecione uma das seguintes:

  • HSM

  • TPM

  • VLAN

  • DLP

Explicação

Questão 3 de 6

1

Security administrators have recently implemented several security controls to enhance the network's security posture. Management wants to ensure that these controls continue to function as intended. Which of the following tools is the BEST choice to meet this goal?

Selecione uma das seguintes:

  • Routine Audit

  • Change Management

  • Design Review

  • Black Box Test

Explicação

Questão 4 de 6

1

Your organization recently hired an outside security auditor to review internal processes. The auditor identified several employees who had permissions for previously held jobs within the company. What should the organization implement to prevent this in the future?

Selecione uma das seguintes:

  • Design Reviews

  • Code Reviews

  • Baseline Review

  • User Rights and Permissions Reviews

Explicação

Questão 5 de 6

1

Your organization's security policy states that administrators should follow the principle of least privilege. Which of the following tools can ensure that administrators are following the policy?

Selecione uma das seguintes:

  • Users Rights and Permissions Reviews

  • Risk Assessment

  • Vulnerability Assessment

  • Threat Assessment

Explicação

Questão 6 de 6

1

Management within your organization wants to limit documents copied to USB flash drives. Which of the following can be used to meet this goal?

Selecione uma das seguintes:

  • DLP

  • Content Filtering

  • IPS

  • Logging

Explicação