PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

The security administrator is determining the:

A set of standardized system images with a pre-defined set of applications is used to build enduser workstations. The security administrator has scanned every workstation to create a current
inventory of all applications that are installed on active workstations and is documenting which
applications are out-of-date and could be exploited. The security administrator is determining the:

Which of the following BEST describes the compromised system?

An administrator is investigating a system that may potentially be compromised, and sees the
following log entries on the router.
*Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 3 packets.
*Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 6 packets.
*Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 8 packets.
Which of the following BEST describes the compromised system?

Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organizati

During a disaster recovery planning session, a security administrator has been tasked with
determining which threats and vulnerabilities pose a risk to the organization. Which of the following
should the administrator rate as having the HIGHEST frequency of risk to the organization?