Which of the following would BEST mitigate this?
A security administrator has concerns that employees are installing unapproved applications on
their company provide smartphones. Which of the following would BEST mitigate this?
Which of the following will accomplish the security manager’s objective?
The security manager must store a copy of a sensitive document and needs to verify at a later
point that the document has not been altered. Which of the following will accomplish the security
manager’s objective?
Which of the following steps did the administrator perform?
A security Operations Center was scanning a subnet for infections and found a contaminated
machine. One of the administrators disabled the switch port that the machine was connected to,
and informed a local technician of the infection. Which of the following steps did the administrator
perform?
Which of the following should the administrator deploy?
A security administrator wants to block unauthorized access to a web server using a locally
installed software program. Which of the following should the administrator deploy?
Which of the following is this known as?
A network administrator has identified port 21 being open and the lack of an IDS as a potential risk
to the company. Due to budget constraints, FTP is the only option that the company can is to
transfer data and network equipment cannot be purchased. Which of the following is this known
as?
Which of the following logs should the administrator search for information regarding the breach?
A security administrator is investigating a recent server breach. The breach occurred as a result of
a zero-day attack against a user program running on the server. Which of the following logs should
the administrator search for information regarding the breach?
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
A user attempts to install new and relatively unknown software recommended by a colleague. The
user is unable to install the program, despite having successfully installed other programs
previously. Which of the following is MOST likely the cause for the user’s inability to complete the
installation?
Which of the following authentication services is being deployed by the administrator?
A system administrator is configuring shared secrets on servers and clients. Which of the following
authentication services is being deployed by the administrator? (Select two.)
Which of the following default ports on the firewall must the security engineer open to accomplish this task?
The finance department just procured a software application that needs to communicate back to
the vendor server via SSL. Which of the following default ports on the firewall must the security
engineer open to accomplish this task?
Which of the following did the organization fail to properly implement?
After an audit, it was discovered that an account was not disabled in a timely manner after an
employee has departed from the organization. Which of the following did the organization fail to
properly implement?