Tyler Hampton
Test por , creado hace más de 1 año

Given a scenario, implement appropriate risk mitigation strategies.

5
0
0
Tyler Hampton
Creado por Tyler Hampton hace casi 6 años
Cerrar

S+ Objective 2.3 Quiz

Pregunta 1 de 6

1

A network administrator needs to update the operating system on switches used within the network. Assuming the organization is following standard best practices, what should the administrator do first?

Selecciona una de las siguientes respuestas posibles:

  • Submit a request using the baseline configuration process.

  • Submit a request using the incident management process.

  • Submit a request using the change management process.

  • Submit a request using the application patch management process.

Explicación

Pregunta 2 de 6

1

Management wants to ensure that employees do not print any documents that include customer PII. Which of the following solutions would meet this goal?

Selecciona una de las siguientes respuestas posibles:

  • HSM

  • TPM

  • VLAN

  • DLP

Explicación

Pregunta 3 de 6

1

Security administrators have recently implemented several security controls to enhance the network's security posture. Management wants to ensure that these controls continue to function as intended. Which of the following tools is the BEST choice to meet this goal?

Selecciona una de las siguientes respuestas posibles:

  • Routine Audit

  • Change Management

  • Design Review

  • Black Box Test

Explicación

Pregunta 4 de 6

1

Your organization recently hired an outside security auditor to review internal processes. The auditor identified several employees who had permissions for previously held jobs within the company. What should the organization implement to prevent this in the future?

Selecciona una de las siguientes respuestas posibles:

  • Design Reviews

  • Code Reviews

  • Baseline Review

  • User Rights and Permissions Reviews

Explicación

Pregunta 5 de 6

1

Your organization's security policy states that administrators should follow the principle of least privilege. Which of the following tools can ensure that administrators are following the policy?

Selecciona una de las siguientes respuestas posibles:

  • Users Rights and Permissions Reviews

  • Risk Assessment

  • Vulnerability Assessment

  • Threat Assessment

Explicación

Pregunta 6 de 6

1

Management within your organization wants to limit documents copied to USB flash drives. Which of the following can be used to meet this goal?

Selecciona una de las siguientes respuestas posibles:

  • DLP

  • Content Filtering

  • IPS

  • Logging

Explicación