Which of the following should the technician recommend to address this problem?
.A technician is auditing the security posture of an organization. The audit shows that many of the
users have the ability to access the company’s accounting information. Which of the following
should the technician recommend to address this problem?
Which of the following is commonly used in a distributed denial of service (DDOS) attack?
Which of the following is commonly used in a distributed denial of service (DDOS) attack?
Which scenario or element would typically cause a CGI (Common Gateway Interface) security issue?
Which scenario or element would typically cause a CGI (Common Gateway Interface) security
issue?
Choose the compoenent that you would locate in the DMZ (Demilitarized Zone).
Choose the compoenent that you would locate in the DMZ (Demilitarized Zone).
which is FALSE for a network based IDS system?
Of the intrusion detection capabilities listed below, which is FALSE for a network based IDS
system?
Which of the following actions should the administrator take FIRST?
A security specialist is called to an onsite vacant office where an employee has found an
unauthorized wireless access device connected to an RJ-45 jack linked to the corporate LAN.
Which of the following actions should the administrator take FIRST?
Which of the following types of firewalls provides inspection at layer 7 of the OSI model?
Which of the following types of firewalls provides inspection at layer 7 of the OSI model?
Choose the attack or malicious code that cannot be prevented or deterred solely through using technical measur
Choose the attack or malicious code that cannot be prevented or deterred solely through using
technical measures.
Company intranet, newsletters, posters, login banners and e-mails would be good tools to utilize in a security
Company intranet, newsletters, posters, login banners and e-mails would be good tools to utilize in
a security:
This may be happening because the sensor is connected to the network with a:
An IDS sensor on a network is not capturing all the network data traffic. This may be happening
because the sensor is connected to the network with a: