Which of the following MUST be implemented to support t…
A system administrator wants to ensure that only authorized devices can connect to the wired and wireless corporate system. Unauthorized devices should be
automatically be placed on a guest network. Which of the following MUST be implemented to support these requirements? (Select TWO).
Which of the following MUST be completed on the firewall?
A security administrator has been tasked to only allow traffic from HTTPS and SSH on a segregated network that contains sensitive information. Which of the
following MUST be completed on the firewall?
The security manager should set a value of 24 hours for the:
A security manager needs to implement a backup solution as part of the disaster recovery plan. The system owners have indicated that the business cannot afford
to lose more than a day of transactions following an event where data would have been restored. The security manager should set a value of 24 hours for the:
Which of the following security controls is the adminis…
An administrator wants to configure the security setting in the AD domain to force users to use a unique new password at least ten times before a password can be
reused. Which of the following security controls is the administrator enforcing?
Which of the following is this an example of?
A company has implemented a public-facing authentication system that uses PKI and extended attributes to allow third-party, web-based application integration.
Which of the following is this an example of? (Select THREE).
Which of the following would BEST provide security betw…
A security administrator is seeking a secure way to send emails to a subcontractor without requiring user action. Which of the following would BEST provide security
between email gateways?
which of the following DNS properties should be changed…
An administrator must change the IP address of the corporate web server. Since this is a critical web server, downtime must be kept to a minimum. To minimize
downtime as much as possible, which of the following DNS properties should be changed well before the actual IP change?
Which of the following could be implemented?
Ann, a security administrator, needs to implement a transport encryption solution that will enable her to detect attempts to sniff packets. Which of the following could
be implemented?
Which of the following are user authentication factors …
A security administrator wants to implement a multi-factor, location-based authentication system. The authentication system must incorporate something unique
about each user. Which of the following are user authentication factors that can be used by the system? (Select THREE).
Which of the following should the employee use to trans…
An organization’s security policy requires secure file transfers to and from internal hosts. An employee is attempting to upload a file using an unsecure method to a
Linux-based dedicated file server and fails. Which of the following should the employee use to transfer the file?