1.
A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to customer PCs. Which of the following should the administrator use to test the patching process quickly and often?
2.
An administrator is building a development environment and requests that three virtual servers are cloned and placed in a new virtual network isolated from the production network. Which of the following describes the environment the administrator is building?
3.
Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised?
4.
Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults?
5.
Which of the following does full disk encryption prevent?
6.
Full disk encryption is MOST effective against the following threats:
7.
Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?
8.
To protect corporate data on removable media, a security policy should mandate that all removable devices use the following:
9.
A merchant acquirer has the need to store credit card numbers in a transactional database in a high performance environment. Which of the following BEST protects the credit card data?
10.
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?