Which of the following are being used?
A company has implemented full disk encryption. Clients must authenticate with a username and
password at a pre-boot level to unlock the disk and again a username and password at the
network login. Which of the following are being used? (Select TWO)
Which of the following principles of social engineering was used to lure Anne into clicking the phishing link
Anne an employee receives the following email:
From: Human Resources
To: Employee
Subject: Updated employee code of conduct
Please click on the following link: http//external.site.com/codeofconduct.exe to review the updated
code of conduct at your earliest convenience.
After clicking the email link, her computer is compromised. Which of the following principles of
social engineering was used to lure Anne into clicking the phishing link in the above email?
Which of the following would resolve the issue?
During a review a company was cited for allowing requestors to approve and implement their own
change request. Which of the following would resolve the issue? (Select TWO)
Which of the following should be enabled in IPSec to allow this?
A security administrator wishes to protect session leys should a private key become discovered.
Which of the following should be enabled in IPSec to allow this?
which of the following stages of the Incident Handling Response?
A workstation is exhibiting symptoms of malware and the network security analyst has decided to
remove the system from the network. This represents which of the following stages of the Incident
Handling Response?
Which of the following would provide the MOST objective results when performing penetration testing for an org
Which of the following would provide the MOST objective results when performing penetration
testing for an organization?
Which of the following would meet this goal?
An administrator would like users to authenticate to the network using only UDP protocols. Which
of the following would meet this goal?
When employing PKI to send signed and encrypted data the individual sending the data must have: (Select TWO)
When employing PKI to send signed and encrypted data the individual sending the data must
have: (Select TWO)
Which of the following would provide the BEST environment for performing this testing?
Joe a technician is tasked with finding a way to test operating system patches for a wide variety of
servers before deployment to the production environment while utilizing a limited amount of
hardware resources. Which of the following would provide the BEST environment for performing
this testing?
Which of the following is the BEST solution?
A custom PKI application downloads a certificate revocation list (CRL) once per day. Management
requests the list be checked more frequently. Which of the following is the BEST solution?