Question 11

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?
  • Question 12

    Which of the following environments minimizes end-user disruption and is MOST likely to be used to assess the impacts of any database migrations or major system changes by using the final version of the code?
  • Question 13

    Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).
  • Question 14

    A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI. Which of the following should the administrator configure?
  • Question 15

    An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include:
    * Check-in/checkout of credentials
    * The ability to use but not know the password
    * Automated password changes
    * Logging of access to credentials
    Which of the following solutions would meet the requirements?