Annie notices that her browser shows that the certificate fo…
Annie notices that her browser shows that the certificate for the site she is visiting is not valid. After performing some checks, she sees that the certificate is on the CA’s certificate revocation list. Which of the following is not a reasons for a certificate to be on the CRL?
Read DetailsFrank is a security administrator for a large company. Occas…
Frank is a security administrator for a large company. Occasionally, a user needs to access a specific resource that they don’t have permission to access. Which access control methodology would be most helpful in this situation?
Read DetailsHoward is assessing the legal risks to his organization base…
Howard is assessing the legal risks to his organization based on its handling of PII. The organization is based in the United States, handles the data of customers located in Europe, and stores information in Japanese datacenters. What law would be most important to Howard during his assessment?
Read DetailsNina is tasked with putting radio frequency identification (…
Nina is tasked with putting radio frequency identification (RFID) tags on every new piece of equipment that enters her datacenter that costs more than $500. What type of organizational policy is the most likely to include this type of requirement?
Read DetailsRick has three major categories of data and applications in…
Rick has three major categories of data and applications in use in his virtualization environment: highly sensitive, business sensitive, and unclassified (or public information). He wants to ensure that data and applications of different sensitivities are not compromised in the event of a breach. What migration technique is best suited to this type of requirement? C12
Read Details