Which of the following should the administrator do to h…
A security administrator has deployed five additional copies of the same virtualized Linux server to distribute the load of web traffic on the original server. Which of
the following should the administrator do to help security harden these new systems? (Select TWO).
Which of the following scan types is being run on the d…
An assessment team is conducting a vulnerability scan of an organization’s database servers. During the configuration of the vulnerability scanner, the lead
assessor only configures the parameter of the database servers’ IP range, and then runs the vulnerability scanner. Which of the following scan types is being run on
the database servers?
Which of the following should the company implement?
A company must implement management controls to deter system administrators from making unauthorized changes to sensitive systems. Which of the following
should the company implement?
Which of the following is the MOST important security a…
A large retail vendor provides access to a heating, ventilation, and air conditioning vendor for the purpose of issuing billing statements and receiving payments. A
security administrator wants to prevent attackers from using compromised credentials to access the billing system, moving laterally to the point-of-sale (POS)
system, and installing malware to skim credit card data. Which of the following is the MOST important security architecture consideration the retail vendor should
impose?
Which of the following actions would result in the LEAS…
A server technician is about to perform a major upgrade to the operating system of a critical system. This system is currently in a virtualization environment. Which
of the following actions would result in the LEAST amount of downtime if the upgrade were to fail?
Which of the following techniques would be BEST suited …
Ann, a network security engineer, is trying to harden her wireless network. Currently, users are able to connect any device to the wireless network as long as they
authenticate with their network username and password. She is concerned that devices that are not company-issued may gain unauthorized access. Which of the
following techniques would be BEST suited to remediate this vulnerability? (Select TWO).
Which of the following actions would help prevent SQL i…
Which of the following actions would help prevent SQL injection on a web application?
Which of the following authentication services utilizes…
Which of the following authentication services utilizes UDP for communication between client and server?
Which of the following types of activity is MOST accura…
A systems administrator is part of the organization’s contingency and business continuity planning process. The systems administrator and relevant team participant
in the analysis of a contingency situation intended to elicit constructive discussion. Which of the following types of activity is MOST accurately described in this
scenario?
The application is MOST likely using:
A security administrator, believing it to be a security risk, disables IGMP snooping on a switch. This breaks a video application. The application is MOST likely using: