Marcella has been hired to perform an audit of a security in…

Marcella has been hired to perform an audit of a security incident where a large corporation was using an open-source application that they had deployed to a cloud service provider. The application was used to manage the many people whose information it tracked and included a lot of identifying information about them that could be used in identity fraud. Unfortunately, the person that installed the application never removed the default administrative account that was still using the default password. Which of the following describes this scenario?

Michonne currently manages a private cloud that has been bui…

Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life, and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?

Stan is walking past a row of cubicles when he notices someo…

Stan is walking past a row of cubicles when he notices someone’s password written down on a sticky note that is attached to a monitor. The password is passwordpassword3. Besides the obvious problem of the word password repeated followed by a single number, which of the following policies isn’t in place that should be?

Ingrid has configured one of the network segments to use a D…

Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?