Question 151
The email administrator must reduce the number of phishing emails by utilizing more appropriate security controls The following configurations already are in place
* Keyword Mocking based on word lists
* URL rewriting and protection
* Stopping executable files from messages
Which of the following is the BEST configuration change for the administrator to make?
* Keyword Mocking based on word lists
* URL rewriting and protection
* Stopping executable files from messages
Which of the following is the BEST configuration change for the administrator to make?
Question 152
A systems administrator recently joined an organization and has been asked to perform a security assessment of controls on the organization's file servers, which contain client data from a number of sensitive systems. The administrator needs to compare documented access requirements to the access implemented within the file system.
Which of the following is MOST likely to be reviewed during the assessment? (Select two.)
Which of the following is MOST likely to be reviewed during the assessment? (Select two.)
Question 153
A security manager recently categorized an information system. During the categorization effort, the manager determined the loss of integrity of a specific information type would impact business significantly. Based on this, the security manager recommends the implementation of several solutions. Which of the following, when combined, would BEST mitigate this risk? (Select TWO.)
Question 154
One of the objectives of a bank is to instill a security awareness culture. Which of the following are techniques that could help to achieve this? (Choose two.)
Question 155
A small firm's newly created website has several design flaws The developer created the website to be fully compatible with ActiveX scripts in order to use various digital certificates and trusting certificate authorities. However, vulnerability testing indicates sandboxes were enabled, which restricts the code's access to resources within the user's computer. Which of the following is the MOST likely cause of the error"?