Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer ALL the questions carefully. Thanks 54- During recent audit, it was discovered that employees are using personal emails to send sensitive documents even

Please answer ALL the questions carefully. Thanks

image text in transcribed

54- During recent audit, it was discovered that employees are using personal emails to send sensitive documents even though policy strictly prohibits this practice. Which of the following describes the type of control that could prevent this from happening? A) Management B) Operational C) Technical D) Access 55- Security administrator at an educational institution has been asked to evaluate current access controls in place at the student testing center and provide recommendations for improvement. After auditing the center's processing, procedures, and a logical control, the administration finds that controls related to students' identification and authentication are inadequate. Which of the following areas of improvement would be MOST appropriate for administrator to recommended (select three answers A) development of new policies focused on the password complexity B) Requirement to present a photo ID when entering the testing center C) Keystroke dynamics when scheduling testing appointment. D) Distribution of asynchronous soft token to teachers supplying tests to the testing center E) Fingerprint verification at the testing center F) Use of a PIN in conjunction with student ID cards G) Issuing of smart cards to testing instruction H) Requirement of student mailing addresses on ID cards 67- A systems administrator wants to install a new PKI certificate on a web server. The administrator creates a CSR. Which of the following should the administrator sand to the CA to ensure a trusted certificate? A) The web server's public key B) The web server's private key e web server's private/public key pair D) The web server's CA public key 68- A corporation will soon begin utilizing a new email system. Chief security office (CSO) focuses on providing a system that incorporates confidentially, integrity, and availability. The email platform can import certificates but cannot create or manager them. Which of the following system will the CSO needs to implement to meet the objective? A) ECC and high-availability firewalls B) TPM and RAID C) CA services and load balanced D) OCSP and off-site backup

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases On The Web Designing And Programming For Network Access

Authors: Patricia Ju

1st Edition

1558515100, 978-1558515109

More Books

Students also viewed these Databases questions