GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Howard is assessing the legal risks to his organization base…

Howard is assessing the legal risks to his organization based on its handling of PII. The organization is based in the United States, handles the data of customers located in Europe, and stores information in Japanese datacenters. What law would be most important to Howard during his assessment?

Read Details

Nina is tasked with putting radio frequency identification (…

Nina is tasked with putting radio frequency identification (RFID) tags on every new piece of equipment that enters her datacenter that costs more than $500. What type of organizational policy is the most likely to include this type of requirement?

Read Details

Rick has three major categories of data and applications in…

Rick has three major categories of data and applications in use in his virtualization environment: highly sensitive, business sensitive, and unclassified (or public information). He wants to ensure that data and applications of different sensitivities are not compromised in the event of a breach. What migration technique is best suited to this type of requirement? C12

Read Details

Paul has performed an nmap scan of a new network-connected d…

Paul has performed an nmap scan of a new network-connected device. He notices TCP ports 22, 80, and 443 are open. If his hardening guidelines only allow encrypted management interfaces, what port or ports should he disable from this list? C12

Read Details

Christina wants to implement access badges printed with pict…

Christina wants to implement access badges printed with picture IDs for her organization, but she wants to use a wireless reader. What access badge technology is commonly implemented in scenarios like this? 

Read Details

Jake’s vulnerability scanner reports that the software of hi…

Jake’s vulnerability scanner reports that the software of his organization running is vulnerable to a cryptographic downgrade attack. What concern should Jake have about this potential issue?

Read Details

Isaac wants to deploy sensors to detect intruders in a facil…

Isaac wants to deploy sensors to detect intruders in a facility, but he is concerned that the sensors may be overly sensitive. What type of sensor is best suited to detecting intruders in an open office environment without significant expense or issues with sensitivity? 

Read Details

Jack wants to ensure the integrity of a file that he is send…

Jack wants to ensure the integrity of a file that he is sending to a third party via email. How can he provide the integrity of a file to an organization that he has not done business with before?

Read Details

Quentin wants to deploy a single sign-on system to allow his…

Quentin wants to deploy a single sign-on system to allow his users to log into cloud services. Which of the following technologies is he most likely to deploy?

Read Details

What is the primary reason to remove unnecessary software du…

What is the primary reason to remove unnecessary software during hardening efforts?

Read Details

Posts pagination

Newer posts 1 2 3 4 … 71,121 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top