- (Exam Topic 13)
What protocol is often used between gateway hosts on the Internet?
Correct Answer:B
- (Exam Topic 9)
During an audit of system management, auditors find that the system administrator has not been trained. What actions need to be taken at once to ensure the integrity of systems?
Correct Answer:D
- (Exam Topic 10)
Refer to the information below to answer the question.
A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party provider’s facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications used by the organization.
What additional considerations are there if the third party is located in a different country?
Correct Answer:C
- (Exam Topic 11)
To protect auditable information, which of the following MUST be configured to only allow read access?
Correct Answer:B
- (Exam Topic 11)
What security risk does the role-based access approach mitigate MOST effectively?
Correct Answer:A