Please answer the ALL the questions carefully. Thanks 41- A project manager is c
ID: 3714044 • Letter: P
Question
Please answer the ALL the questions carefully. Thanks
41- A project manager is calculating budgetary reserves for the funding of ta software development project. In an attempt to develop cost models for security -related bugs, the manager determines a security- related bug is identified once every quarter and each but cost roughly $20,000 to fixed it. Given the project is a planned to last for two years, which of the following should the manager estimate for the cost of security-related bug remediation for the project? A) $40,000 B) $80,000 C)S160,000 D) 320,000 42-Which of the following authentication protocols is commonly associated with TCP port 389? A) LDAP B) RADIUS C) TACACS+ D) SAML 43- Which of the following of the best ways to prevent personally on the electronic devices from being connected to corporate network? (Select two answers) A) Strong authentication with a hardware component. B) MAC based network authentication. C) Annual technology refresh cycle. D) Installing a guest network with WPA2 E) Drafting a clear BYOD policy F Disabling SSID broadcast and using RF shielding 44- An organization's IT manager is implementing some new controls related to the secure management and configuration of networking equipment within the production architectures. One of the controls requires log files to be stored away from the network perimeter and secured against unauthorized modification. Which of the following would BEST provide the capability required to the address this control? A) File integrity monitor B) SIEM C) DMZ D) Local RAID drive 45- Which of the following risk mitigation strategies could be implemented in to ensure IT staff does not implement unapproved modifications to the company's email system? A) Incident management B) Change management C) Data loss prevention D) Routine audits 46- Which of the following does RAID 10 provide? (Select two answers) A) Lower MTBF B) increased VO C) Confidentiality D) Redundancy E) Integrity F) Higher MTTFExplanation / Answer
Answer)
46) D) Redundancy and Confidentiality by mirroring all the data on secondary drive.
45) D) Routine Audits to be made to prevent the unapproved modifications to the company's email system.
42) A) LDAP (Light Weight Directory access Protocol)
Hope this answer helps .:) Happy to help.