- (Exam Topic 5)
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?
Correct Answer:
C
- (Exam Topic 5)
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your employer?
Correct Answer:
A
- (Exam Topic 5)
What are the three stages of an identity and access management system?
Correct Answer:
A
Reference: https://digitalguardian.com/blog/what-identity-and-access-management-iam
- (Exam Topic 5)
What are the three hierarchically related aspects of strategic planning and in which order should they be done?
Correct Answer:
D
- (Exam Topic 2)
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
Correct Answer:
B