Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance 31-An information security officer has been asked to

Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance

image text in transcribed

31-An information security officer has been asked to investigate the feasibility of implementing full disk encryption within the organization to secure mobile devices. Which of the following features should the officer evaluate to determine if the organizational laptops are equipped to support hardware-based full disk encryption? A) UEFI B) TPM C) EFS D) SSD 32- A virtualized server in a datacenter is required to have high availability. A vendor-released security patch much be applied to the server as soon as possible. Which of the following would allow the server administrator to install the patch with the LEAST amount of downtime? A) The server administrator should take the VM offline and install the security patch. When the patch has been tested, and approved, the VM should be put back into service B) The server administrator should install the patch in a sandboxed area of the existing VM, and the VM should be taken offline. After testing the patch, the VM should be put back into service. C) The server administrator should take a snapshot of the VM and apply the security patch to the snapshot. The original VM should be taken offline until testing and approval of the patch can be done. D) The server administrator should take a snapshot of the VM, power it off, and spin up the snapshot. The patch should then be applied to the original VM. When the patch is installed and tested, the original VM should be put into service. 33- A network administrator has been tasked with security retrieving a copy of the current running configuration of a network router for an auditor. Which of the following would be the BEST method to retrieve this file? A) Encryption email B) SCP C) HTTP D) TFTP 34- A network administrator has noticed there are many addresses on the network that are not recognized in the device registration logs. Which of the following is the BEST way to solve this problem? A) Adjust the AP power levels. B) Disable the SSID broadcast. C) Switch from TKKIP to CCMP D) implementing MAC address filtering 35- An organization in in the process of implementing a OKI solution for its employees. During the risk analysis phase, it was determent that the handling of the backup key would cost the organization a considerable amount of money due to the additional staffing and build-out of a secure area where the keys will reside. Which of the following would be the BEST course of action moving forward with the PKl project? A) Out-of-band key exchange B) key escrow C) Certificate authority D) In-band-key exchange E) Registration authority

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases Illuminated

Authors: Catherine Ricardo

2nd Edition

1449606008, 978-1449606008

More Books

Students also viewed these Databases questions

Question

1. Select the job or jobs to be analyzed.

Answered: 1 week ago

Question

Why is the System Build Process an iterative process?

Answered: 1 week ago