Which of the following network segmentation schemas would BEST meet this objective?
An organization has three divisions: Accounting, Sales, and Human Resources. Users in the
Accounting division require access to a server in the Sales division, but no users in the Human
Resources division should have access to resources in any other division, nor should any users in
the Sales division have access to resources in the Accounting division. Which of the following
network segmentation schemas would BEST meet this objective?
Which of the following would be the BEST course of action for the consultant to recommend?
A retail store uses a wireless network for its employees to access inventory from anywhere in the
store. Due to concerns regarding the aging wireless network, the store manager has brought in a
consultant to harden the network. During the site survey, the consultant discovers that the network
was using WEP encryption. Which of the following would be the BEST course of action for the
consultant to recommend?
Which of the following MUST happen before the server can communicate on VLAN 12?
A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication
works fine, but VLAN 12 does not. Which of the following MUST happen before the server can
communicate on VLAN 12?
Three of the primary security control types that can be implemented are.
Three of the primary security control types that can be implemented are.
which applications a user can install and run on a company issued mobile device?
Which of the following technical controls is BEST used to define which applications a user can
install and run on a company issued mobile device?
Which of the following controls is being described in this situation?
To help prevent unauthorized access to PCs, a security administrator implements screen savers
that lock the PC after five minutes of inactivity. Which of the following controls is being described
in this situation?
Which of the following is a management control?
Which of the following is a management control?
Which of the following can result in significant administrative overhead from incorrect reporting?
Which of the following can result in significant administrative overhead from incorrect reporting?
Which of the following describes this cause?
A vulnerability scan is reporting that patches are missing on a server. After a review, it is
determined that the application requiring the patch does not exist on the operating system.
Which of the following describes this cause?
Which of the following BEST describes these results?
Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for
multicast packets from the switches on the network. After investigation, she discovers that this is
normal activity for her network. Which of the following BEST describes these results?