Question 16

An IT manager is estimating the mobile device budget for the upcoming year. Over the last five years, the number of devices that were replaced due to loss, damage, or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced next year?
  • Question 17

    In determining when it may be necessary to perform a credentialed scan against a system instead of a non- credentialed scan, which of the following requirements is MOST likely to influence its decisions?
  • Question 18

    A user has attempted to access data at a higher classification level than the user's account is currency authorized to access. Which of the following access control models has been applied to this user's account?
  • Question 19

    A user of the wireless network is unable to gain access to the network.
    The symptoms are:
    1.) Unable to connect to both internal and Internet resources
    2.) The wireless icon shows connectivity but has no network access
    The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate.
    Which of the following is the MOST likely cause of the connectivity issues?
  • Question 20

    A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation, the supervisor terminates an employee as a result of the suspected data loss. During the investigation, the supervisor is absent for the interview, and little evidence can be provided form the role-based authentication system in use by the company. The situation can be identified for future mitigation as which of the following?