1. A security analyst needs to implement an MDM solution for BYOD users that will allow the
company to retain control over company emails residing on the devices and limit data exfiltration
that might occur if the devices are lost or stolen.
Which of the following would BEST meet these requirements? (Select TWO).
A. Full-device encryption
B. Network usage rules
C. Geofencing
D. Containerization
E. Application whitelisting
F. Remote control
Answer: A,B
2. Several universities are participating in a collaborative research project and need to share
compute and storage resources .
Which of the following cloud deployment strategies would BEST meet this need?
A. Community
B. Private
C. Public
D. Hybrid
Answer: A
Explanation:
Community cloud storage is a variation of the private cloud storage model, which offers cloud
solutions for specific businesses or communities. In this model, cloud storage providers offer
their cloud architecture, software and other development tools to meet the requirements of the
community. A community cloud in computing is a collaborative effort in which infrastructure is
shared between several organizations from a specific community with common concerns
(security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and
hosted internally or externally.
3. A company recently experienced an attack in which a malicious actor was able to exfiltrate
data by cracking stolen passwords, using a rainbow table the sensitive data.
Which of the following should a security engineer do to prevent such an attack in the future?
A. Use password hashing.
B. Enforce password complexity
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |