Which of the following should be implemented to correct…
Technicians working with servers hosted at the company’s datacenter are increasingly complaining of electric shocks when touching metal items which have been
linked to hard drive failures. Which of the following should be implemented to correct this issue?
which of the following attacks?
A web application is configured to target browsers and allow access to bank accounts to siphon money to a foreign account. This is an example of which of the
following attacks?
Which of the following works by implanting software on …
Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?
Which of the following should identify critical systems…
Which of the following should identify critical systems and components?
Which of the following could best prevent this from occ…
During a routine audit, it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the
server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring again?
Which of the following technical controls MUST be in pl…
Company policy requires the use if passphrases instead if passwords. Which of the following technical controls MUST be in place in order to promote the use of
passphrases?
Which of the following could the security administrator…
A security administrator has been tasked with improving the overall security posture related to desktop machines on the network. An auditor has recently that
several machines with confidential customer information displayed in the screens are left unattended during the course of the day. Which of the following could the
security administrator implement to reduce the risk associated with the finding?
In order to implement a true separation of duties appro…
A bank requires tellers to get manager approval when a customer wants to open a new account. A recent audit shows that there have been four cases in the
previous year where tellers opened accounts without management approval. The bank president thought separation of duties would prevent this from happening. In
order to implement a true separation of duties approach the bank could:
Which of the following can be implemented to reduce the…
A security administrator returning from a short vacation receives an account lock-out message when attempting to log into the computer. After getting the account
unlocked the security administrator immediately notices a large amount of emails alerts pertaining to several different user accounts being locked out during the
past three days. The security administrator uses system logs to determine that the lock-outs were due to a brute force attack on all accounts that has been
previously logged into that machine. Which of the following can be implemented to reduce the likelihood of this attack going undetected?
Which of the following is being described?
An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing
the malware the attacker is provided with access to the infected machine. Which of the following is being described?