Question 386

An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?
  • Question 387

    A security incident responder discovers an attacker has gained access to a network and has overwritten
    key system files with backdoor software. The server was reimaged and patched offline. Which of the
    following tools should be implemented to detect similar attacks?
  • Question 388

    A team is at the beginning stages of designing a new enterprise-wide application. The new application will have a large database and require a capital investment in hardware. The Chief Information Officer (СIO) has directed the team to save money and reduce the reliance on the datacenter, and the vendor must specialize in hosting large databases in the cloud. Which of the following cloud-hosting options would BEST meet these needs?
  • Question 389

    A large company is preparing to merge with a smaller company. The smaller company has been very profitable, but the smaller company's main applications were created in-house. Which of the following actions should the large company's security administrator take in preparation for the merger?
  • Question 390

    Within change management, winch of the following ensures functions are earned out by multiple employees?