An audit has revealed that database administrators are also responsible for auditing database changes and backup logs.Which of the following access control methodologies would BEST mitigate this concern?
A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list.Which of the following BEST describes this type of IDS?
Which of the following is an asymmetric function that generates a new and separate key every time it runs?
Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe receives a response, he is unable to decrypt the response with the same key he used initially.Which of the following would explain the situation?
When it comes to cloud computing, if one of the requirements for a project is to have the most control over the systems in the cloud, which of the following is a service model that would be BEST suited for this goal?
A company has a security policy that specifies all endpoint computing devices should be assigned a unique identifier that can be tracked via an inventory management system. Recent changes to airline security regulations have cause many executives in the company to travel with mini tablet devices instead of laptops. These tablet devices are difficult to tag and track. An RDP application is used from the tablet to connect into the company network.Which of the following should be implemented in order to meet the security policy requirements?