Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please answer ALL the questions carefully. Thanks 54- During recent audit, it was discovered that employees are using personal emails to send sensitive documents even
Please answer ALL the questions carefully. Thanks
54- During recent audit, it was discovered that employees are using personal emails to send sensitive documents even though policy strictly prohibits this practice. Which of the following describes the type of control that could prevent this from happening? A) Management B) Operational C) Technical D) Access 55- Security administrator at an educational institution has been asked to evaluate current access controls in place at the student testing center and provide recommendations for improvement. After auditing the center's processing, procedures, and a logical control, the administration finds that controls related to students' identification and authentication are inadequate. Which of the following areas of improvement would be MOST appropriate for administrator to recommended (select three answers A) development of new policies focused on the password complexity B) Requirement to present a photo ID when entering the testing center C) Keystroke dynamics when scheduling testing appointment. D) Distribution of asynchronous soft token to teachers supplying tests to the testing center E) Fingerprint verification at the testing center F) Use of a PIN in conjunction with student ID cards G) Issuing of smart cards to testing instruction H) Requirement of student mailing addresses on ID cards 67- A systems administrator wants to install a new PKI certificate on a web server. The administrator creates a CSR. Which of the following should the administrator sand to the CA to ensure a trusted certificate? A) The web server's public key B) The web server's private key e web server's private/public key pair D) The web server's CA public key 68- A corporation will soon begin utilizing a new email system. Chief security office (CSO) focuses on providing a system that incorporates confidentially, integrity, and availability. The email platform can import certificates but cannot create or manager them. Which of the following system will the CSO needs to implement to meet the objective? A) ECC and high-availability firewalls B) TPM and RAID C) CA services and load balanced D) OCSP and off-site backupStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started