Howard is assessing the legal risks to his organization base…
Howard is assessing the legal risks to his organization based on its handling of PII. The organization is based in the United States, handles the data of customers located in Europe, and stores information in Japanese datacenters. What law would be most important to Howard during his assessment?
Read DetailsNina is tasked with putting radio frequency identification (…
Nina is tasked with putting radio frequency identification (RFID) tags on every new piece of equipment that enters her datacenter that costs more than $500. What type of organizational policy is the most likely to include this type of requirement?
Read DetailsRick has three major categories of data and applications in…
Rick has three major categories of data and applications in use in his virtualization environment: highly sensitive, business sensitive, and unclassified (or public information). He wants to ensure that data and applications of different sensitivities are not compromised in the event of a breach. What migration technique is best suited to this type of requirement? C12
Read DetailsPaul has performed an nmap scan of a new network-connected d…
Paul has performed an nmap scan of a new network-connected device. He notices TCP ports 22, 80, and 443 are open. If his hardening guidelines only allow encrypted management interfaces, what port or ports should he disable from this list? C12
Read DetailsIsaac wants to deploy sensors to detect intruders in a facil…
Isaac wants to deploy sensors to detect intruders in a facility, but he is concerned that the sensors may be overly sensitive. What type of sensor is best suited to detecting intruders in an open office environment without significant expense or issues with sensitivity?
Read Details