Which of the following MUST the administrator allow thr…
The firewall administrator is installing a VPN application and must allow GRE through the firewall. Which of the following MUST the administrator allow through the
firewall?
Which of the following ports must be allowed through th…
A security administrator recently implemented IPSec for remote users. Which of the following ports must be allowed through the firewall in order for remote access
to be successful if the tunneling protocol is PPTP?
Which of the following are useful in this scenario?
A forensics expert needs to be able to prove that digital evidence, originally taken into custody, has not been tampered with. Which of the following are useful in this
scenario?
Which of the following practices should the administrat…
Due to the commonality of Content Management System (CMS) platforms, a website administrator is concerned about security for the organization’s new CMS
application. Which of the following practices should the administrator implement FIRST to mitigate risks associated with CMS platform implementations?
Which of the following is the BEST way to comply with t…
An organization received a subpoena requesting access to data that resides on an employee’s computer. The organization uses PKI. Which of the following is the
BEST way to comply with the request?
which server was breached?
A data breach is suspected on a currently unidentified server in a datacenter. Which of the following is the BEST method of determining which server was
breached?
Which of the following would reduce the likelihood of t…
A system administrator decided to perform maintenance on a production server servicing retail store operations. The system rebooted in the middle of the day due
to the installation of monthly operating system patches. The downtime results in lost revenue due to the system being unavailable. Which of the following would
reduce the likelihood of this issue occurring again?
Which of the following could be used to reduce the lik…
On a campus network, users frequently remove the network cable from desktop NICs and plug personal laptops into the school network. Which of the following
could be used to reduce the likelihood of unauthorized laptops on the campus network?
Which of the following should the network technician use?
A network technician needs to pass traffic from the company’s external IP address to a front-end mail server in the DMZ without exposing the IP address of the mail
server to the external network. Which of the following should the network technician use?
Which of the following controls should be implemented t…
A finance manager is responsible for approving wire transfers and processing the transfers using the software provided by the company’s bank. A number of
discrepancies have been found related to the wires in a recent financial audit and the wires appeared to be fraudulent. Which of the following controls should be
implemented to reduce the likelihood of fraud related to the use of wire transfers?