Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email,
but she is worried about the confidentiality of the information. Which of the following will
accomplish this task securely?
Which of the following BEST describes this type of malware?
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type of malware?
Which of the following default ports should Ann ensure is open?
Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer
using Kerberos authentication, but she cannot connect to the destination machine. Which of the
following default ports should Ann ensure is open?
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
Which of the following should be considered to mitigate data theft when using CAT5 wiring?
Which of the following should be considered to mitigate data theft when using CAT5 wiring?
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered comp
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be
considered components of:
Which of the following controls is being described in this situation?
To help prevent unauthorized access to PCs, a security administrator implements screen savers
that lock the PC after five minutes of inactivity. Which of the following controls is being described
in this situation?
Which of the following would be the BEST technology control to use in this scenario?
A company is trying to limit the risk associated with the use of unapproved USB devices to copy
documents. Which of the following would be the BEST technology control to use in this scenario?
Which of the following should he do to segment that traffic from the other traffic?
Pete, a network administrator, is capturing packets on the network and notices that a large amount
of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment
that traffic from the other traffic?
Which of the following controls could they implement to BEST meet this goal?
A company’s employees were victims of a spear phishing campaign impersonating the CEO. The
company would now like to implement a solution to improve the overall security posture by
assuring their employees that email originated from the CEO. Which of the following controls could
they implement to BEST meet this goal?