Nicola reports to the security guards that individuals are following closely when she enters buildings, using her credentials to gain access. She knows that some are valid employees but is concerned that not all the people are. What security breach is she reporting? correct answers Answer: Nicola is reporting a security breach related to tailgating or piggybacking.
2. Question
As stated in your organization's new password policy, you must configure how many new passwords must be created before an old one can be reused. Which policy should you use? correct answers Answer: According to the new password policy, you must configure at least one new password to be created before an old one can be reused.
3. Question
After installing a software firewall on his computer, a user reports that he is unable to connect to any Web sites. The user must be able to connect to all types of Web sites. Which ports should you open in the firewall application? correct answers Answer: You should open port 80 for HTTP and port 443 for HTTPS in the firewall application.
4. Question
You are researching biometrics for identification and verification of employees in an organization. Which attributes or details of an employee can be used by biometric devices? correct answers Answer: Biometric devices can use attributes like fingerprint, iris pattern, facial features, voice, or hand geometry for identification and verification.
5. Question
Which technology allows users to freely access all systems to which their account has been granted access after performing an initial authentication? correct answers Answer: Single Sign-On (SSO) technology allows users to access all systems to which their account has been granted access after performing an initial authentication.
6. Question
When explaining the differences between NTFS and FAT32 to a user installing Window 7, which three benefits would you share with them regarding NTFS? correct answers Answer: The benefits of NTFS over FAT32 include support for larger file sizes, better file security through file permissions, and improved disk quotas.
7. Question
You need to ensure that the data on storage media is properly classified to ensure that the appropriate data is retained. Which operation must you undertake to avoid mishandling of tapes, CD-ROMs, floppy disks, and printed material? correct answers Answer: You must undertake data classification to ensure that the appropriate data is retained and not mishandled. 8. Question
A hacker has called a company employee and learned the employee's user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered? correct answers Answer: The company has suffered a social engineering attack, specifically a phishing attack.
9. Question
You want to provide secure access to the research laboratory and ensure that only authorized persons can enter the laboratory's server room. Which system does NOT provide an effective means of ensuring that only authorized persons can enter the server room? correct answers Answer: A regular lock and key system does not provide an effective means of ensuring that only authorized persons can enter the server room.
10. Question
Several users will be using a new Windows 7 computer. You have been asked to configure the accounts in the appropriate manner to maximize security. Which procedures should you implement? correct answers Answer: You should implement strong password policies, user account control, and regular software updates to maximize security on a new Windows 7 computer.
11. Question
You need to implement security measures for the mobile devices that have been issued
to company employees. Which security measure is considered to be the easiest to implement for mobile devices? correct answers Answer: Implementing device encryption is considered to be the easiest security measure to implement for mobile devices.
12. Question
You have recently implemented five different security solutions for a small business. Move the correct items from the left column to the column on the right to match the security solutions on the left with the security issue that the solution BEST addresses. correct answers Answer: (The options for this question were not provided in your message.)
13. Question
Your company has recently adopted several new security policies regarding mobile devices. Which mobile device application helps when a mobile device is stolen, but also
raises privacy concerns? correct answers Answer: The mobile device application that helps when a mobile device is stolen but raises privacy concerns is a remote wipe application.
14. Question
What is a smart card? correct answers Answer: A smart card is a physical card that contains an integrated circuit chip, which can store data securely and perform cryptographic operations.