Which of the following BEST describes the process of do…
Which of the following BEST describes the process of documenting everyone who has physical access or
possession of evidence
Which of the following will allow the administrator to …
After connecting a workstation directly to a small business firewall, a network administrator is trying to manage
it via HTTPS without losing its stored configuration. The only two pieces of information that the network
administrator knows about the firewall are the management interface MAC address, which is
01:4a:d1:fa:b1:0e, and the administrator’s password. Which of the following will allow the administrator to log
onto the firewall via HTTPS if the management’s IP address is unknown and the administrator’s workstation IP
address is 192.168.0.10/23?
Which of the following preventative controls would MOST…
The Chief Information Security Officer (CISO) at a large organization has been reviewing some security-related
incidents at the organization and comparing them to current industry trends. The desktop security engineerfeels that the use of USB storage devices on office computers has contributed to the frequency of security
incidents. The CISO knows the acceptable use policy prohibits the use of USB storage devices. Every user
receives a popup warning about this policy upon login. The SIEM system produces a report of USB violations
on a monthly basis; yet violations continue to occur. Which of the following preventative controls would MOST
effectively mitigate the logical risks associated with the use of USB
storage devices?
Which of the following components should be used to ach…
An educational institution would like to make computer labs available to remote students. The labs are used for
various IT networking, security, and programming courses. The requirements are:
1. Each lab must be on a separate network segment.
2. Labs must have access to the Internet, but not other lab networks.
3. Student devices must have network access, not simple access to hosts on the lab networks.
4. Students must have a private certificate installed before gaining access.
5. Servers must have a private certificate installed locally to provide assurance to the students.
6. All students must use the same VPN connection profile.
Which of the following components should be used to achieve the design in conjunction with directory services?
Which of the following is the MOST cost effective way f…
A university requires a significant increase in web and database server resources for one week, twice a year, to
handle student registration. The web servers remain idle for the rest of the year. Which of the following is the
MOST cost effective way for the university to securely handle student registration?
Which of the following MUST be implemented to support t…
A system administrator wants to ensure that only authorized devices can connect to the wired and wireless corporate system. Unauthorized devices should be
automatically be placed on a guest network. Which of the following MUST be implemented to support these requirements? (Select TWO).
Which of the following MUST be completed on the firewall?
A security administrator has been tasked to only allow traffic from HTTPS and SSH on a segregated network that contains sensitive information. Which of the
following MUST be completed on the firewall?
The security manager should set a value of 24 hours for the:
A security manager needs to implement a backup solution as part of the disaster recovery plan. The system owners have indicated that the business cannot afford
to lose more than a day of transactions following an event where data would have been restored. The security manager should set a value of 24 hours for the:
Which of the following security controls is the adminis…
An administrator wants to configure the security setting in the AD domain to force users to use a unique new password at least ten times before a password can be
reused. Which of the following security controls is the administrator enforcing?
Which of the following is this an example of?
A company has implemented a public-facing authentication system that uses PKI and extended attributes to allow third-party, web-based application integration.
Which of the following is this an example of? (Select THREE).