712-50 Exam Question 106
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Once supervisors and data owners have approved requests, information system administrators will implement:
Once supervisors and data owners have approved requests, information system administrators will implement:
712-50 Exam Question 107
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?
712-50 Exam Question 108
Which of the following is the MOST effective method for discovering common technical vulnerabilities within the IT environment?
712-50 Exam Question 109
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
712-50 Exam Question 110
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
