Question 366
While attending a meeting with the human resources department, an organization's information security officer sees an employee using a username and password written on a memo pad to log into a specific service. When the information security officer inquires further as to why passwords are being written down, the response is that there are too many passwords to remember for all the different services the human resources department is required to use.
Additionally, each password has specific complexity requirements and different expiration time frames.
Which of the following would be the BEST solution for the information security officer to recommend?
Additionally, each password has specific complexity requirements and different expiration time frames.
Which of the following would be the BEST solution for the information security officer to recommend?
Question 367
An educational institution would like to make computer labs available to remote students. The labs are used for various IT networking, security, and programming courses. The requirements are:
Each lab must be on a separate network segment.
Labs must have access to the Internet, but not other lab networks.
Student devices must have network access, not simple access to hosts on the lab networks.
Students must have a private certificate installed before gaining access.
Servers must have a private certificate installed locally to provide assurance to the students.
All students must use the same VPN connection profile.
Which of the following components should be used to achieve the design in conjunction with directory services?
Each lab must be on a separate network segment.
Labs must have access to the Internet, but not other lab networks.
Student devices must have network access, not simple access to hosts on the lab networks.
Students must have a private certificate installed before gaining access.
Servers must have a private certificate installed locally to provide assurance to the students.
All students must use the same VPN connection profile.
Which of the following components should be used to achieve the design in conjunction with directory services?
Question 368
A new database application was added to a company's hosted VM environment. Firewall ACLs were modified to allow database users to access the server remotely. The company's cloud security broker then identified abnormal from a database user on-site. Upon further investigation, the security team noticed the user ran code on a VM that provided access to the hypervisor directly and access to other sensitive data.
Which of the following should the security do to help mitigate future attacks within the VM environment?
(Choose two.)
Which of the following should the security do to help mitigate future attacks within the VM environment?
(Choose two.)
Question 369
A medical facility wants to purchase mobile devices for doctors and nurses. To ensure accountability, each
individual will be assigned a separate mobile device. Additionally, to protect patients' health information,
management has identified the following requirements:
Data must be encrypted at rest.

The device must be disabled if it leaves the facility.

The device must be disabled when tampered with.

Which of the following technologies would BEST support these requirements? (Select two.)
individual will be assigned a separate mobile device. Additionally, to protect patients' health information,
management has identified the following requirements:
Data must be encrypted at rest.

The device must be disabled if it leaves the facility.

The device must be disabled when tampered with.

Which of the following technologies would BEST support these requirements? (Select two.)
Question 370
A recent incident revealed a log entry was modified alter its original creation. Which of the following technologies would BEST ensure end user systems are able to defend against future incidents?