Which of the following protocols would be the MOST secure method to transfer files from a host machine?
Which of the following protocols would be the MOST secure method to transfer files from a host
machine?
Which of the following BEST describes this type of attack?
A user receives an automated call which appears to be from their bank. The automated recording
provides details about the bank’s privacy policy, security policy and requests that the user clearly
state their name, birthday and enter the banking details to validate the user’s identity. Which of the
following BEST describes this type of attack?
Which of the following software should a security administrator implement if several users are stating that th
Which of the following software should a security administrator implement if several users are
stating that they are receiving unwanted email containing advertisements?
Which of the following is a technique designed to obtain information from a specific person?
Which of the following is a technique designed to obtain information from a specific person?
The BEST way to protect the confidentiality of sensitive data entered in a database table is to use:
The BEST way to protect the confidentiality of sensitive data entered in a database table is to use:
Which of the following describes this form of access control?
Reviewing an access control list on a firewall reveals a Drop All statement at the end of the rules.
Which of the following describes this form of access control?
Which of the following encryption types would protect this information from disclosure if lost or stolen?
An employee stores their list of passwords in a spreadsheet on their local desktop hard drive.
Which of the following encryption types would protect this information from disclosure if lost or
stolen?
Which of the following is MOST commonly a part of routine system audits?
Which of the following is MOST commonly a part of routine system audits?
which enforces lower case password using letters from ‘a’ through ‘z’ where ‘n
Which of the following represents the complexity of a password policy which enforces lower case
password using letters from ‘a’ through ‘z’ where ‘n’ is the password length?
Which of the following security technologies could be used to provide remote access?
In order to provide flexible working conditions, a company has decided to allow some employees
remote access into corporate headquarters. Which of the following security technologies could be
used to provide remote access? (Select TWO).