which of the following control types?
The IT department has setup a share point site to be used on the intranet. Security has
established the groups and permissions on the site. No one may modify the permissions and all
requests for access are centrally managed by the security team. This is an example of which of
the following control types?
Which of the following cryptographic algorithms is MOST often used with IPSec?
Which of the following cryptographic algorithms is MOST often used with IPSec?
Which of the following attack types is this?
Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone
number displayed on the caller ID matches the vendor’s number. When the purchasing agent asks
to call the vendor back, they are given a different phone number with a different area code. Which
of the following attack types is this?
Which of the following attack types is this?
Purchasing receives an automated phone call from a bank asking to input and verify credit card
information. The phone number displayed on the caller ID matches the bank. Which of the
following attack types is this?
Which of the following would be the MOST appropriate strategy for securing the server?
Users require access to a certain server depending on their job function. Which of the following
would be the MOST appropriate strategy for securing the server?
Which of the following account management practices does this help?
The IT department has setup a website with a series of questions to allow end users to reset their
own accounts. Which of the following account management practices does this help?
Which of the following is designed to stop an intrusion on the network?
Pete, a security administrator, has observed repeated attempts to break into the network. Which of
the following is designed to stop an intrusion on the network?
Which of the following authentication services should be used on this port by default?
An information bank has been established to store contacts, phone numbers and other records. A
UNIX application needs to connect to the index server using port 389. Which of the following
authentication services should be used on this port by default?
Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees
Which of the following would Pete, a security administrator, MOST likely implement in order to
allow employees to have secure remote access to certain internal network services such as file
servers?
Which of the following should be done before resetting a user’s password due to expiration?
Which of the following should be done before resetting a user’s password due to expiration?