<< Prev Question Next Question >>

Question 102/132

A security solutions architect has argued consistently to implement the most secure method of encrypting corporate messages. The solution has been derided as not being cost effective by other members of the IT department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to unauthorized decryption. The method also requires special handling and security for all key material that goes above and beyond most encryption systems.
Which of the following is the solutions architect MOST likely trying to implement?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (132q)
Question 1: A company decides to purchase commercially available softwar...
Question 2: The security engineer receives an incident ticket from the h...
Question 3: A network engineer wants to deploy user-based authentication...
Question 4: A user is suspected of engaging in potentially illegal activ...
Question 5: A critical system audit shows that the payroll system is not...
Question 6: An internal development team has migrated away from Waterfal...
Question 7: An accountant at a small business is trying to understand th...
Question 8: A company Chief Information Officer (CIO) is unsure which se...
Question 9: A large company is preparing to merge with a smaller company...
Question 10: The telecommunications manager wants to improve the process ...
Question 11: Since the implementation of IPv6 on the company network, the...
Question 12: Ann is testing the robustness of a marketing website through...
Question 13: It has come to the IT administrator's attention that the "po...
Question 14: A Chief Financial Officer (CFO) has raised concerns with the...
Question 15: A company provides on-demand cloud computing resources for a...
Question 16: A company has a difficult time communicating between the sec...
Question 17: An IT manager is working with a project manager to implement...
Question 18: A company has decided to change its current business directi...
Question 19: An organization has several production critical SCADA superv...
Question 20: A project manager working for a large city government is req...
Question 21: There have been some failures of the company's internal faci...
Question 22: A vulnerability scanner report shows that a client-server ho...
Question 23: An IT auditor is reviewing the data classification for a sen...
Question 24: A company is in the process of implementing a new front end ...
Question 25: An IT manager is concerned about the cost of implementing a ...
Question 26: Which of the following technologies prevents an unauthorized...
Question 27: A web services company is planning a one-time high-profile e...
Question 28: A company that must comply with regulations is searching for...
Question 29: A security administrator is tasked with increasing the avail...
Question 30: A small company's Chief Executive Officer (CEO) has asked it...
Question 31: A senior network security engineer has been tasked to decrea...
Question 32: A security manager is looking into the following vendor prop...
Question 33: A security administrator was recently hired in a start-up co...
Question 34: A system administrator has just installed a new Linux distri...
Question 35: An investigator wants to collect the most volatile data firs...
Question 36: A security manager looked at various logs while investigatin...
Question 37: Which of the following would be used in forensic analysis of...
Question 38: An IT manager is working with a project manager from another...
Question 39: A network administrator with a company's NSP has received a ...
Question 40: Company policy requires that all company laptops meet the fo...
Question 41: A web developer is responsible for a simple web application ...
Question 42: A facilities manager has observed varying electric use on th...
Question 43: Using SSL, an administrator wishes to secure public facing s...
Question 44: A new IT company has hired a security consultant to implemen...
Question 45: The IT Security Analyst for a small organization is working ...
Question 46: A storage as a service company implements both encryption at...
Question 47: A security administrator is assessing a new application. The...
Question 48: A company has noticed recently that its corporate informatio...
Question 49: The Chief Executive Officer (CEO) of an Internet service pro...
Question 50: A company is trying to decide how to manage hosts in a branc...
Question 51: SIMULATION Company A has noticed abnormal behavior targeting...
Question 52: The network administrator at an enterprise reported a large ...
Question 53: An organization has implemented an Agile development process...
Question 54: The Chief Information Security Officer (CISO) is asking for ...
Question 55: An administrator believes that the web servers are being flo...
Question 56: A security administrator has been asked to select a cryptogr...
Question 57: ABC Company must achieve compliance for PCI and SOX. Which o...
Question 58: A software developer and IT administrator are focused on imp...
Question 59: A medical device manufacturer has decided to work with anoth...
Question 60: Wireless users are reporting issues with the company's video...
Question 61: VPN users cannot access the active FTP server through the ro...
Question 62: Due to compliance regulations, a company requires a yearly p...
Question 63: A Chief Information Security Officer (CISO) has requested th...
Question 64: An IT Manager is concerned about errors made during the depl...
Question 65: A new web based application has been developed and deployed ...
Question 66: A new internal network segmentation solution will be impleme...
Question 67: A security analyst, Ann, states that she believes Internet f...
Question 68: During a new desktop refresh, all hosts are hardened at the ...
Question 69: An information security assessor for an organization finishe...
Question 70: The Information Security Officer (ISO) is reviewing a summar...
Question 71: A security administrator is performing VDI traffic data coll...
Question 72: Which of the following activities is commonly deemed "OUT OF...
Question 73: An enterprise must ensure that all devices that connect to i...
Question 74: SIMULATION An administrator wants to install a patch to an a...
Question 75: A risk manager has decided to use likelihood and consequence...
Question 76: A recently hired security administrator is advising develope...
Question 77: After the install process, a software application executed a...
Question 78: An administrator wishes to replace a legacy clinical softwar...
Question 79: A penetration tester is inspecting traffic on a new mobile b...
Question 80: An organization uses IP address block 203.0.113.0/24 on its ...
Question 81: An external penetration tester compromised one of the client...
Question 82: Joe, a penetration tester, is tasked with testing the securi...
Question 83: A firm's Chief Executive Officer (CEO) is concerned that IT ...
Question 84: The DLP solution has been showing some unidentified encrypte...
Question 85: A security administrator has noticed that an increased numbe...
Question 86: A finance manager says that the company needs to ensure that...
Question 87: A multi-national company has a highly mobile workforce and m...
Question 88: A trucking company delivers products all over the country. T...
Question 89: An administrator is implementing a new network-based storage...
Question 90: The latest independent research shows that cyber attacks inv...
Question 91: An employee is performing a review of the organization's sec...
Question 92: A security services company is scoping a proposal with a cli...
Question 93: Company policy requires that all unsupported operating syste...
Question 94: A port in a fibre channel switch failed, causing a costly do...
Question 95: The risk manager at a small bank wants to use quantitative a...
Question 96: The following has been discovered in an internally developed...
Question 97: A system worth $100,000 has an exposure factor of eight perc...
Question 98: An administrator has enabled salting for users' passwords on...
Question 99: A bank is in the process of developing a new mobile applicat...
Question 100: ODBC access to a database on a network-connected host is req...
Question 101: Company ABC is hiring customer service representatives from ...
Question 102: A security solutions architect has argued consistently to im...
Question 103: SIMULATION Compliance with company policy requires a quarter...
Question 104: A well-known retailer has experienced a massive credit card ...
Question 105: A pentester must attempt to crack passwords on a windows dom...
Question 106: ABC Corporation has introduced token-based authentication to...
Question 107: A security tester is testing a website and performs the foll...
Question 108: An international shipping company discovered that deliveries...
Question 109: Company XYZ finds itself using more cloud-based business too...
Question 110: A bank has decided to outsource some existing IT functions a...
Question 111: A security consultant is conducting a network assessment and...
Question 112: An organization recently upgraded its wireless infrastructur...
Question 113: The Chief Executive Officer (CEO) of a small start-up compan...
Question 114: A security administrator wants to calculate the ROI of a sec...
Question 115: A small company is developing a new Internet-facing web appl...
Question 116: ABC Corporation uses multiple security zones to protect syst...
Question 117: The Information Security Officer (ISO) believes that the com...
Question 118: Company XYZ has purchased and is now deploying a new HTML5 a...
Question 119: A security firm is writing a response to an RFP from a custo...
Question 120: A company has adopted a BYOD program. The company would like...
Question 121: An educational institution would like to make computer labs ...
Question 122: A company with 2000 workstations is considering purchasing a...
Question 123: Joe is a security architect who is tasked with choosing a ne...
Question 124: A security administrator notices a recent increase in workst...
Question 125: A security auditor suspects two employees of having devised ...
Question 126: A human resources manager at a software development company ...
Question 127: News outlets are beginning to report on a number of retail e...
Question 128: An insurance company has an online quoting system for insura...
Question 129: The IT director has charged the company helpdesk with saniti...
Question 130: The finance department for an online shopping website has di...
Question 131: After reviewing a company's NAS configuration and file syste...
Question 132: A security architect has been engaged during the implementat...