Which of the following should the administrator investigate?
After a private key has been compromised, an administrator realized that downloading a CRL once per day was not effective. The administrator wants to
immediately revoke certificates. Which of the following should the administrator investigate?
Which of the following is a method of tracking attempts…
A network administrator discovers that telnet was enabled on the company’s Human Resources (HR) payroll server and that someone outside the HR subnet has
been attempting to log into the server. The network administrator has disabled telnet on the payroll server. Which of the following is a method of tracking attempts
to log onto telnet without exposing important telnet data.
Which of the following, if enabled, would confirm the a…
A security administrator is troubleshooting a network connectivity issue. The administrator believes that a router’s ACL may be blocking network traffic to a remote
network. Which of the following, if enabled, would confirm the administrator’s theory by providing helpful feedback?
Which of the following should a server administrator us…
A CA is attempting to publicize the acceptable parameters for certificate signing requests. Which of the following should a server administrator use to fulfill the
requirements of the CA?
Which of the following security goals is the company tr…
A company uses digital signatures to sign contracts. The company requires external entities to create an account with a third-party digital signature provider and
sign an agreement stating they will protect the account from unauthorized access. Which of the following security goals is the company trying to address in the
given scenario?
Which of teh following options could further improve th…
A datacenter has suffered repeated burglaries that lead to equipment theft and arson. In the past, the thieves have demonstrated a determination to bypass any
installed safeguards. After mantraps had been installed to prevent tailgating, the thieves crashed through the wall of the datacenter with a vehicle after normal
business hours. Which of teh following options could further improve the physical safety and security of the datacenter? (select TWO).
Which of the following could be used to determine who c…
The content of a document that is routinely used by several employees and contains confidential information has been changed. While investigating the issue, it is
discovered that payment information for all teh company’s clients has been removed from the document. Which of the following could be used to determine who
changed the information?
Which of the following would BEST help the company redu…
A company has noticed a recent increase in machines that have been exploited using vulnerabilities via third party software. Which of the following would BEST
help the company reduce the likelihood of vulnerabilities within the software creating future problems?
To initiate changes in teh process, the network adminis…
Based on a review of the existing access policies the network administrator determines that that changes are needed to meet current regulatory requirements of the
organization’s access control process. To initiate changes in teh process, the network administrator should FIRST:
The company has relocated to a:
An organization experienced a fire at its datacenter and was unable to operate at that location. The company moved to a location where HVAC and power are
available, but must supply and configure its own computing resources in order to provide services. The company has relocated to a: