Which of teh following is useful in this scenario?
A forensics investigator needs to be able to prove that digital evidence was not tampered with after being taken into custody. Which of teh following is useful in this
scenario?
Which of the following social engineering techniques BE…
Attackers use techniques when sending tailored emails to engage their targets and make them feel personally involved. Which of the following social engineering
techniques BEST describes this type of attack?
Which of the following are valid security concepts that…
A company is providing mobile devices to all its employees. The system administrator has been tasked with providing input for the company’s new mobile device
policy. Which of the following are valid security concepts that the system administrator should include when offering feedback to management? (Select TWO)
An organization that uses a cloud infrastructure to pre…
An organization that uses a cloud infrastructure to present a payment portal is using:
Which of the following technologies BEST meets the stat…
A network administrator is in the process of developing a new network security infrastructure. One of the requirements for the new system is the ability to perform
advanced authentication, authorization, and accounting. Which of the following technologies BEST meets the stated requirement?
Which of the following could the administrator impleme…
A security administrator has been tasked hardening operating system security on tablets that will be deployed for use by floor salespeople at retail outlets. Which of
the following could the administrator implement to reduce the likelihood that unauthorized users will be able to access information on the tablets?
Which of the following protocols would accomplish this …
A recent policy change at an organization requires that all remote access connections to and from file servers at remote locations must be encrypted. Which of the
following protocols would accomplish this new objective? (Select TWO).
Which of the following BEST explains this situation?
A security administrator conducts a vulnerability scan on multiple web servers. Some of findings are not found on the web server. Which of the following BEST
explains this situation?
which of the following must be installed on the client?
In order to establish a connection to a server using secure LDAP, which of the following must be installed on the client?
Which of the following is the MOST likely reason that t…
A security administrator receives an IDS alert that a single internal IP address is connecting to several known malicious command and control domains. The
administrator connects to the switch and adds a MAC filter to Port 18 to block the system from the network.
BEFORE AFTER
MAC Address VLAN Port MAC Address VLAN Port
67A7.353B.5064 101 4 67A7.353B.5064 101 4
7055.4961.1F33 100 9 7055.4961.1F33 100 9
0046.6416.5809 101 21 0046.6416.5809 101 21
7027.0108.31B5 100 16 7027.0108.31B5 100 16
5243.6353.7720 101 6 5243.6353.7720 101 6
1484.A471.6542 100 2 1484.A471.6542 100 2
80C7.8669.5845 101 7 80C7.8669.5845 101 7
7513.77B9.4130 101 18 0046.6419.5809 101 18
5A77.1816.3859 101 19 5A77.1816.3859 101 19
8294.7E31.3270 100 8 8294.7E31.3270 100 8
A few minutes later, the same malicious traffic starts again from a different IP. Which of the following is the MOST likely reason that the system was able to bypass
the administrator’s MAC filter?