“Computer workstations must be locked when the workspace is unoccupied and turned off at the end of the business day.” “Laptops must be either locked with a locking cable or locked in a drawer or filing cabinet.”Which policy includes these directives?
You are the chief security administrator in your enterprise….
You are the chief security administrator in your enterprise. You are asked to train every employee, from top-level officers to front gate security officers, to make them aware of various security risks. Which of the following training techniques should you use?
Which wireless probe is designed to scan and record wireless…
Which wireless probe is designed to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?
You have been hired as a security administrator. While analy…
You have been hired as a security administrator. While analyzing your organization’s personnel policies, you notice the presence of multiple orphaned accounts. How should you handle this situation?
Which of the following is a legal complication related to fo…
Which of the following is a legal complication related to forensics that should be considered when creating a cloud platform?
You are a cybersecurity investigator who needs query log fil…
You are a cybersecurity investigator who needs query log files for faster analysis during an incident investigation. Which of the following log management tools should you use?
Which technology under wireless communication is an integrat…
Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate the IoT device?
What does the end-of-service notice indicate?
What does the end-of-service notice indicate?
John is instructed by his CEO to introduce an employee atten…
John is instructed by his CEO to introduce an employee attendance system that replaces the current manual-sign register. The system cannot use a power supply and must adhere to COVID-19 protection protocols.What method should John use for this system?
Which of the following authentication methods belongs in the…
Which of the following authentication methods belongs in the “something you have” category?