A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.
Correct Answer:
C
A software house is developing a new application. The application has the following requirements: Reduce the number of credential requests as much as possible
Integrate with social networks Authenticate users
Which of the following is the BEST federation method to use for the application?
Correct Answer:
D
A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage.
Which of the following is a security concern that will MOST likely need to be addressed during migration?
Correct Answer:
B
Technicians have determined that the current server hardware is outdated, so they have decided to throw it out. Prior to disposal, which of the following is the BEST method to use to ensure no data remnants can be
recovered?
Correct Answer:
B
Company A acquired Company . During an audit, a security engineer found Company B’s environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A’s security program.
Which of the following risk-handling techniques was used?
Correct Answer:
D