Which of the following principles of effectiveness did …
An attacker is able to successfully execute a social engineering attack by entering a building while dressed as a building security guard. Which of the following
principles of effectiveness did the attacker utilize to execute the attack?
Which of the following ports should be blocked by the f…
A firewall administrator has been instructed to block common Microsoft file sharing ports due to a recent malware outbreak. Which of the following ports should be
blocked by the firewall? (Select TWO).
Which of the following can the technician use to verify…
A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a
system file was compromised? (Select TWO).
Which of the following is a critical security considera…
A company hosts sites for multiple vendors and provides information to users globally. Which of the following is a critical security consideration in this environment?
Which of the following should Joe enable on his worksta…
Joe, a user, wants to configure his work station to make certain that the certificate he receives when connecting to websites is still valid. Which of the following
should Joe enable on his workstation to achieve this?
An annual audit of the business partner is conducted ag…
A company exchanges information with a business partner. An annual audit of the business partner is conducted against the SLA in order to verify.
How can a technician BEST disprove this argument?
During a trial for possession of illegal content, a defence attorney argues that several of the files on the forensic image may have been tampered with. How can a
technician BEST disprove this argument?
Which of the following protocols would BEST facilitate …
A security administrator wishes to implement a secure method of file transfer when communicating with outside organizations. Which of the following protocols
would BEST facilitate secure file transfers? (Select TWO).
Which of the following would meet the security manager’…
As their data set rapidly grows and changes, a company is experiencing availability problems with their database. The security manager recommends switching to a
more scalable system with dynamic schemas. Which of the following would meet the security manager’s requirements?
Which of the following should be implemented to enforce…
Which of the following should be implemented to enforce the corporate policy requiring up-to-date antivirus and OS patches on all computers connecting to the
network via VPN?