Question 591

Which of the following are the best security controls for controlling on-premises access? (Select two.)
  • Question 592

    A malicious actor conducted a brute-force attack on a company's web servers and eventually gained access to the company's customer information database. Which of the following is the most effective way to prevent similar attacks?
  • Question 593

    An organization is required to maintain financial data records for three years and customer data for five years.
    Which of the following data management policies should the organization implement?
  • Question 594

    An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?
  • Question 595

    A systems administrator is redesigning now devices will perform network authentication. The following requirements need to be met:
    * An existing Internal certificate must be used.
    * Wired and wireless networks must be supported
    * Any unapproved device should be Isolated in a quarantine subnet
    * Approved devices should be updated before accessing resources
    Which of the following would best meet the requirements?