Which of the following actions should the administrator…
The security administrator for a growing company is concerned about the increasing prevalence of personal devices connected to the corporate WLAN. Which of
the following actions should the administrator take FIRST to address this concern?
Which of the following MOST likely explains this occurrence?
A security engineer is monitoring suspicious traffic from an internal endpoint to a malicious landing page of an external entity. The internal endpoint is configured
using a limited account, is fully patched to current standards, and has current antivirus signatures. No alerts have been received involving this endpoint. The
security engineer finds malicious code on the endpoint during a forensic analysis. Which of the following MOST likely explains this occurrence?
Which of the following could the security administrator…
A company uses PKI certificates stored on a smart chip enabled badge. The badge is used for a small number of devices that connect to a wireless network. A user
reported that their badge was stolen. Which of the following could the security administrator implement to prevent the stolen badge from being used to compromise
the wireless network?
Which of the following should be used to meet requirement?
A company is implementing a system to transfer direct deposit to a financial institution. One of the requirements is that the institution must be certain that the
deposit amounts within the file have not been charged. Which of the following should be used to meet requirement?
Which of the following should be used to fulfill this r…
An application developer has coded a new application and needs to test all input fields. Which of the following should be used to fulfill this requirement?
Which of the following has been performed against the d…
A security analyst has been asked to perform penetration testing against a web application being deployed for the first time. When performing the test the
application stops responding and returns an error referring to failed database connections. Upon further investigation, the analyst finds the database server was
inundated with commits which exhausted available space on the volume. Which of the following has been performed against the database server?
Which of the following allows an application to securel…
Which of the following allows an application to securely authenticate a user by receiving credentials from a remote web domain?
Which of the following security methods should Ann sugg…
Ann is preparing a presentation for management to highlight some of the issues the security department is facing trying to integrate the organizations BYOD policy.
Highest of her list is the transparency of network resources. The DAC environment includes several departments including payroll, HR, IT, and Management.
However, the small company’s structure has never been updated to incorporate these departments. The organization continued to add users based on the same
original general user profile. Which of the following security methods should Ann suggest to management to BEST fix this issue?
Which of the following would prevent students from usin…
A university police department is housed on the first floor of a student dormitory. Which of the following would prevent students from using ARP spoofing attacks
against computers at the police department?
Which of the following is the BEST solution?
The CEO for company A has asked the security engineer to design a PKI for company A. The CEO has asked that it allow company A users to send signed and
encrypted emails to company B. The users from company B must have an inherent trust in certificates from company A, because the security policy of company B
disallows adding of new CAs to their trusted root container. Which of the following is the BEST solution?