SOLUTIONS
Which of the following is described as "confidence in your expectation that others will
act in your best interest"? - ANSWER-Trust
Estefan is a network professional for an e-commerce company. The chief information
officer (CIO) wants the customer web portal downtime to be reduced from 5 minutes
per year to 30 seconds per year. The change should occur over the next 6 months.
Which security objective must Estefan employ to accomplish this goal? - ANSWER-
Availability
Kristin's position in IT focuses on using antivirus, anti-spyware, and vulnerability
software patch management to maintain security and integrity. Which IT
infrastructure domain is she protecting? - ANSWER-Workstation Domain
To secure the System/Application Domain of an IT infrastructure, what is the primary
focus? - ANSWER-In a collection of servers and virtualized systems, defending both
data and server computing power
Which of the following must be done first to accomplish an organization's security
goals? - ANSWER-Write down security goals
Temika is the IT security officer for her company. The CIO has told her that network
security success is not about preventing all possible attacks or compromises. Of the
following, what goal or accomplishment should she work toward? - ANSWER-
Continually improving the state of security so that, as time passes, the network is
better protected than it was in the past
As part of the bring your own device (BYOD) program, the company CIO is
encouraging employees to use their personal devices for business purposes.
However, an attacker with the right kind of antenna can access the wireless network
from a great distance, putting internal assets at risk. Of the following, what is the best
solution? - ANSWER-Physically isolate wireless access from the wired network.
A combination of intrusion detection and prevention, as well as logging and
monitoring, provides the best defense against what kind of attack? - ANSWER-Zero-
day exploit
Which of the following roles is most commonly responsible for observing system and
user activity, looking for violations, trends toward bottlenecks, and attempts to
perform violations? - ANSWER-Auditor
A company has discovered that confidential business information has been
repeatedly acquired by a competitor over the past six months. The IT security team
has been unable to find the leaks. The team suspects a form of side-channel