Which of the following ports should be configured?
An administrator needs to allow both secure and regular web traffic into a network. Which of the
following ports should be configured? (Select TWO)
Which of the following practices could be used to increase the security posture during deployment?
A recent audit had revealed weaknesses in the process of deploying new servers and network
devices. Which of the following practices could be used to increase the security posture during
deployment? (Select TWO).
Which of the following areas should be addressed FIRST?
A local hospital with a large four-acre campus wants to implement a wireless network so that
doctors can use tablets to access patients’ medical data. The hospital also wants to provide guest
access to the internet for hospital patients and visitors in select areas. Which of the following areas
should be addressed FIRST?
Which of the following should he perform?
After making a bit-level copy of compromised server, the forensics analyst Joe wants to verify that
he bid not accidentally make a change during his investigation. Which of the following should he
perform?
Which of the following attacks is generally initiated from a botnet?
Which of the following attacks is generally initiated from a botnet?
Which of the following stages if the Incident Handling Response does this describe?
A network security analyst has confirmed that the public facing web server has been
compromised. Which of the following stages if the Incident Handling Response does this
describe?
Deploying compensating security controls is an example of:
Deploying compensating security controls is an example of:
Is this directly supported by SAML?
A web startup wants to implement single sign-on where its customers can log on to the site by
suing their personal and existing corporate email credentials regardless of which company they
work for. Is this directly supported by SAML?
Which of the following is the MOST important consideration when deploying a CCTV camera to meet the requiremen
A security administrator is installing a single camera outside in order to detect unauthorized
vehicles in the parking lot. Which of the following is the MOST important consideration when
deploying a CCTV camera to meet the requirement?
Which of the following has the GREATEST impact on the time it takes to crack the passwords?
A system administrator wants to configure a setting that will make offline password cracking more
challenging. Currently the password policy allows upper and lower case characters a minimum
length of 5 and a lockout after 10 invalid attempts. Which of the following has the GREATEST
impact on the time it takes to crack the passwords?
