Question 226
An organization requires users to provide their fingerprints to access an application. To improve security, the application developers intend to implement multifactor authentication. Which of the following should be implemented?
Question 227
Which of the following technologies employ the use of SAML? (Select two.)
Question 228
An internal intranet site is required to authenticate users and restrict access to content to only those who are authorized to view it. The site administrator previously encountered issues with credential spoofing when using the default NTLM setting and wants to move to a system that will be more resilient to replay attacks. Which of the following should the administrator implement?
Question 229
New magnetic locks were ordered for an entire building. In accordance with company policy, employee
safety is the top priority.
In case of a fire where electricity is cut, which of the following should be taken into consideration when
installing the new locks?
safety is the top priority.
In case of a fire where electricity is cut, which of the following should be taken into consideration when
installing the new locks?
Question 230
You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan.
Instructions: All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simulation, please select the Done button to submit.

Instructions: All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simulation, please select the Done button to submit.
