Which of the following controls is being described in this situation?
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?
Which of the following should he do to segment that traffic from the other traffic?
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).
Which of the following algorithms has well documented collisions? (Select TWO).
Which of the following algorithms has well documented collisions? (Select TWO).
Which of the following would allow Jane to perform this kind of testing?
Jane, the security administrator, needs to be able to test malicious code in an environment where it will not harm the rest of the network. Which of the following would allow Jane to perform this kind of testing?
This is a form of which of the following concepts?
A company is sending out a message to all users informing them that all internal messages need to be digitally signed. This is a form of which of the following concepts?
Which of the following transportation encryption protocols should be used to ensure maximum security between a
Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?
Which of the following strategies would BEST mitigate this risk?
Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk?
Which of the following is true about the ALE?
A server containing critical data will cost the company $200/hour if it were to be unavailable due to DoS attacks. The security administrator expects the server to become unavailable for a total of two days next year. Which of the following is true about the ALE?
To reduce an organizations risk exposure by verifying compliance with company policy, which of the following s
To reduce an organizations risk exposure by verifying compliance with company policy, which of the following should be performed periodically?