Which of the following is the MOST likely cause of this…
Joe, a sales employee, is connecting to a wireless network and has entered the network information correctly.
His computer remains connected to the network but he cannot access any resources on the network.
Which of the following is the MOST likely cause of this issue?
Which of the following is the MOST likely issue?
A new employee has joined the accounting department and is unable to access the accounting server. The
employee can access other network resources and the Internet. Other accounting employees are able to
access the accounting server without any issues. Which of the following is the MOST likely issue?
Which of the following reasons would explain why this a…
A penetration tester is measuring a company’s posture on social engineering. The penetration tester sends a
phishing email claiming to be from IT asking employees to click a link to update their VPN software
immediately. Which of the following reasons would explain why this attack could be successful?
Which of the following concerns will MOST affect the de…
A company’s BYOD policy requires the installation of a company provide mobile agent on their personally
owned devices which would allow auditing when an employee wants to connect a device to the corporate email
system.
Which of the following concerns will MOST affect the decision to use a personal device to receive company
email?
Which of the following automated or semi-automated soft…
Which of the following automated or semi-automated software testing techniques relies on inputting large
amounts of random data to detect coding errors or application loopholes?
Which of the following steps in incident response proce…
Which of the following steps in incident response procedures entails of the incident and identification of
knowledge gained that can be applied to future handling of incidents?
Which of the following is the primary focus?
After several thefts a Chief Executive Officer (CEO) wants to ensure unauthorized do not have to corporate
grounds or its employees. The CEO just approved new budget line items for fences, lighting, locks and CCTVs.
Which of the following is the primary focus?
which of the following poses the greatest security issues?
A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation,
which of the following poses the greatest security issues?
Which of the following encryptions needs BOTH of these …
The security administration team at a company has been tasked with implementing a data-at-rest solution for itscompany storage. Due to the large amount of storage the Chief Information Officer (CISO) decides that a 128-
bit cipher is needed but the CISO also does not want to degrade system performance any more than
necessary. Which of the following encryptions needs BOTH of these needs?
Which of the following choices BEST mitigates the secur…
By hijacking unencrypted cookies an application allows an attacker to take over existing web sessions that do
not use SSL or end to end encryption. Which of the following choices BEST mitigates the security risk of public
web surfing? (Choose two.)