Which of the following could have mitigated or deterred…
Analysis of a recent security breach at an organization revealed that the attack leveraged a telnet server that had not been used in some time. Below are partial
results of an audit that occurred a week before the breach was detected.
OPEN PORTS—TCP 23, TCP 80, TCP 443
OS PATCH LEVEL—CURRENT
PASSWORD AUDIT—PASS, STRONG
FILE INTEGRITY—PASS
Which of the following could have mitigated or deterred this breach?
Which of the following is a management control the comp…
A company has classified the following database records:
OBJECT CONFIDENTIALITY INTEGRITY AVAILABILITY
First Name LOW MEDIUM LOW
Last Name LOW MEDIUM LOW
Address MEDIUM HIGH LOW
Bank Account Number HIGH HIGH MEDIUM
Credit Card Number HIGH HIGH MEDIUM
Which of the following is a management control the company can implement to increase the security of the above information with respect to confidentiality?
Which of the following remote authentication methods us…
Which of the following remote authentication methods uses a reliable transport layer protocol for communication?
How can a technician BEST disprove this argument?
During a trial for possession of illegal content, a defence attorney argues that several of the files on the forensic image may have been tampered with. How can a
technician BEST disprove this argument?
Which of the following controls should be implemented t…
During a recent audit, it was discovered that the employee who deploys patches also approves the patches. The audit found there is no documentation supporting
the patch management process, and there is no formal vetting of installed patches. Which of the following controls should be implemented to mitigate this risk?
(Select TWO).
Which of the following is the MOST important mitigation…
Multi-function devices are being deployed in various departments. All departments will be able to copy, print and scan to file. Some departments will be authorized
to use their devices to fax and email, while other departments will not be authorized to use those functions on their devices. Which of the following is the MOST
important mitigation technique to avoid an incident?
Which of the following should be used to implement voic…
Which of the following should be used to implement voice encryption?
Which of the following types of attacks are MOST likely…
Which of the following types of attacks are MOST likely to be successful when using fuzzing against an executable program? (Select TWO).
Which of the following attacks is this an example of?
A security administrator has detected the following pattern in a TCP packer: URG=1, ACK=1, PSH=1, RST=1, SYN=1, FIN=1. Which of the following attacks is this
an example of?
Which of the following preventative controls should be …
A company has begun construction on a new building. The construction crews have noticed that valuable materials have been stolen from the site. Which of the
following preventative controls should be used by the Chief Security Officer (CSO) to prevent future theft?