246 Chapter 10 ■ Practice Test 2
- Michelle is in charge of her organization’s mobile device management efforts and handles
lost and stolen devices. Which of the following recommendations will provide the most
assurance to her organization that data will not be lost if a device is stolen?
A. Mandatory passcodes and application management
B. Full device encryption and mandatory passcodes
C. Remote wipe and GPS tracking
D. Enabling GPS tracking and full device encryption - Susan’s SMTP server does not authenticate senders before accepting and relaying email.
What is this security configuration issue known as?
A. An email gateway
B. An SMTP relay
C. An X.400-compliant gateway
D. An open relay
For questions 75–77, please refer to the following scenario:
The large business that Jack works for has been using noncentralized logging for years.
They have recently started to implement centralized logging, however, and as they
reviewed logs, they discovered a breach that appeared to have involved a malicious insider.
- When the breach was discovered and the logs were reviewed, it was discovered that the
attacker had purged the logs on the system that they compromised. How can this be pre-
vented in the future?
A. Encrypt local logs
B. Require administrative access to change logs
C. Enable log rotation
D. Send logs to a bastion host - How can Jack detect issues like this using his organization’s new centralized logging?
A. Deploy and use an IDS
B. Send logs to a central logging server
C. Deploy and use a SIEM
D. Use syslog
7 7. How can Jack best ensure accountability for actions taken on systems in his environment?
A. Log review and require digital signatures for each log.
B. Require authentication for all actions taken and capture logs centrally.
C. Log the use of administrative credentials and encrypt log data in transit.
D. Require authorization and capture logs centrally.