A company has a security policy that specifies all endpoint computing devices should be
assigned a unique identifier that can be tracked via an inventory management system. Recent
changes to airline security regulations have cause many executives in the company to travel with
mini tablet devices instead of laptops. These tablet devices are difficult to tag and track. An RDP
application is used from the tablet to connect into the company network. Which of the following
should be implemented in order to meet the security policy requirements?
The security administrator receives an email on a non-company account from a coworker stating
that some reports are not exporting correctly. Attached to the email was an example report file
with several customers' names and credit card numbers with the PIN. Which of the following is
the BEST technical controls that will help mitigate this risk of disclosing sensitive data?
A technician is configuring a wireless guest network. After applying the most recent changes the
technician finds the new devices can no longer find the wireless network by name but existing
devices are still able to use the wireless network. Which of the following security measures did
the technician MOST likely implement to cause this Scenario?
Deactivation of SSID broadcast
Reduction of WAP signal output power
Activation of 802.1X with RADIUS
Implementation of MAC filtering
Beacon interval was decreased
Get Latest & Actual
Exam's Question and Answers from Lead2pass.
A security administrator has been assigned to review the security posture of the standard