Which of the following configurations will meet the requirements?
A company hired Joe, an accountant. The IT administrator will need to create a new account for
Joe. The company uses groups for ease of management and administration of user accounts. Joe
will need network access to all directories, folders and files within the accounting department.
Which of the following configurations will meet the requirements?
Which ports and protocols are MOST likely to be open on the firewall?
During a penetration test from the Internet, Jane, the system administrator, was able to establish a
connection to an internal router, but not successfully log in to it. Which ports and protocols are
MOST likely to be open on the firewall? (Select FOUR).
Which of the following is MOST likely occurring?
Ann, the network administrator, has learned from the helpdesk that employees are accessing the
wireless network without entering their domain credentials upon connection. Once the connection
is made, they cannot reach any internal resources, while wired network connections operate
smoothly. Which of the following is MOST likely occurring?
Which of the following is an application security coding problem?
Which of the following is an application security coding problem?
Which of the following will BEST meet this requirement?
An IT security technician needs to establish host based security for company workstations. Which
of the following will BEST meet this requirement?
Which of the following controls can she implement to address this concern?
Ann works at a small company and she is concerned that there is no oversight in the finance
department; specifically, that Joe writes, signs and distributes paychecks, as well as other
expenditures. Which of the following controls can she implement to address this concern?
Which of the following is the MOST specific plan for various problems that can arise within a system?
Which of the following is the MOST specific plan for various problems that can arise within a
system?
Which of the following methods would MOST likely work?
A hospital IT department wanted to secure its doctor’s tablets. The IT department wants operating
system level security and the ability to secure the data from alteration. Which of the following
methods would MOST likely work?
Which of the following BEST describes the weakness in WEP encryption?
Which of the following BEST describes the weakness in WEP encryption?
Which of the following methods should the company consider to secure this data in the future?
Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles
of a particular vendor. Which of the following methods should the company consider to secure this
data in the future?