Question 286
A security engineer is faced with competing requirements from the networking group and database administrators. The database administrators would like ten application servers on the same subnet for ease of administration, whereas the networking group would like to segment all applications from one another.
Which of the following should the security administrator do to rectify this issue?
Which of the following should the security administrator do to rectify this issue?
Question 287
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and
excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
Question 288
A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject Alternative Name (SAM) attribute of a certificate?
Question 289
A company's loss control department identifies theft as a recurring loss type over the past year. Based on the department's report, the Chief information Office (CIO) wants to detect theft of datacenter equipment. Which of the following controls should be implemented?
Question 290
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet.
Which of the following should be used in the code? (Select TWO.)
Which of the following should be used in the code? (Select TWO.)