Which of the following security controls would be MOST appropriate?
A company wants to prevent unauthorized access to its secure data center. Which of the following
security controls would be MOST appropriate?
Which of the following password parameters is MOST likely misconfigured?
Company policy requires employees to change their passwords every 60 days. The security
manager has verified all systems are configured to expire passwords after 60 days. Despite the
policy and technical configuration, weekly password audits suggest that some employees have
had the same weak passwords in place longer than 60 days. Which of the following password
parameters is MOST likely misconfigured?
Which of the following algorithms should the administrator select?
An administrator would like to utilize encryption that has comparable speed and strength to the
AES cipher without using AES itself. The cipher should be able to operate in the same modes as
AES and utilize the same minimum bit strength. Which of the following algorithms should the
administrator select?
The approach of malware analysis can BEST be described as:
A security analyst has a sample of malicious software and needs to know what the sample does.
The analyst runs the sample in a carefully-controlled and monitored virtual machine to observe the
software’s behavior. The approach of malware analysis can BEST be described as:
which of the following are being used to secure data in transport?
An SSL session is taking place. After the handshake phase has been established and the cipher
has been selected, which of the following are being used to secure data in transport? (Select
TWO)
Which of the following is the BEST method to mitigate security risk within the environment?
Company A and Company B both supply contractual services to a fast paced and growing auto
parts manufacturer with a small local Area Network (LAN) at its local site. Company A performs inhouse billing and invoices services for the local auto parts manufactacturer. Company B provides
in-house parts and widgets services for the local auto parts manufacturers. Which of the following
is the BEST method to mitigate security risk within the environment?
Which of the following types of attack is MOST likely occurring?
The Chief Executive Officer (CEO) Joe notices an increase in the wireless signal in this office and
thanks the IT director for the increase in network speed, Upon investigation the IT department
finds an access point hidden in the dropped ceiling outside of joe’s office. Which of the following
types of attack is MOST likely occurring?
Which of the following documents specifies how much data can be stored offsite, and how quickly the data can b
A security administrator is reviewing the company’s data backup plan. The plan implements nightly
offsite data replication to a third party company. Which of the following documents specifies how
much data can be stored offsite, and how quickly the data can be retrieved by the company from
the third party?
Which of the following authentication services uses a default TCP port of 88?
Which of the following authentication services uses a default TCP port of 88?
Which of the following would BEST address these concerns?
A technician has been tasked with installing and configuring a wireless access point for the
engineering department. After the AP has been installed, there have been reports the employees
from other departments have been connecting to it without approval. Which of the following would
BEST address these concerns?