Question 231
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
Question 232
Which of the following is the appropriate network structure used to protect servers and services that must be provided to external clients without completely eliminating access for internal users?
Question 233
A developer is building a new web portal for internal use. The web portal will only the accessed by internal users and will store operational documents. Which of the following certificate types should the developer install if the company is MOST interested in minimizing costs?
Question 234
A small- to medium-sized company wants to block the use of USB devices on its network. Which of the following is the MOST cost-effective way for the security analyst to prevent this?
Question 235
A security administrator is creating a risk assessment on BYOD. One of the requirements of the risk assessment is to address the following
*Centrally managing mobile devices
*Data loss prevention
Which of the following recommendations should the administrator include in the assessment? (Select TWO).
*Centrally managing mobile devices
*Data loss prevention
Which of the following recommendations should the administrator include in the assessment? (Select TWO).