Operations
Save
The chief information A. Network vulnerability scanner
officer (CIO) wants to
expand the company's
ability to accurately
identify vulnerabilities
across the company. The
CIO wants to be able to
scan client PCs, mobile
devices, servers, routers,
and switches. What type
of scanner are they
looking to institute?
,A financial services D. Degaussing the servers, rendering the data
company is irretrievable, followed by reselling or recycling the
decommissioning many servers after certification
servers that contain highly
sensitive financial
information. The
company's data protection
policy stipulates the need
to use the most secure
data destruction methods
and comply with strict
regulatory requirements.
The company also has a
significant environmental
sustainability commitment
and seeks to minimize
waste wherever possible.
What should the
company's primary course
of action be during this
process?
A cyber technician pulls B. Operating system-specific security logs
logs on the new Apple
iMacs to ensure the
company's employees
adhere to the policy. What
log can provide the
technician with the
computer's attempted
logins or denial when an
employee attempts to
access a file?
,A large multinational C. Attribute-based access control
company uses a cloud-
based document storage
system. The system
provides access to
documents by considering
a combination of factors:
the user's department,
geographic location, the
document's sensitivity
level, and the current date
and time. For example,
only the finance
department of a specific
region can access its
financial reports, and they
can do so only during
business hours. Which
access control model
does the company MOST
likely use to manage this
complex access control
, The IT team at a medium- C .To enhance wireless network security with the
sized company is latest encryption standards
upgrading its wireless
network security to
protect sensitive data and
ensure secure
communication between
devices. They have
decided to implement Wi-
Fi Protected Access 3
(WPA3). What is the
primary purpose of
implementing WPA3 on
the company's wireless
network?
A security specialist is B. It refers to the documentation and verification of
drafting a memorandum the data sanitization or destruction process.
on secure data
destruction for the
organization after a recent
breach. What benefit does
the certification concept
offer when evaluating
appropriate
disposal/decommissioning
?