To do this, the security analyst will perform a:
A company is rolling out a new e-commerce website. The security analyst wants to reduce the risk
of the new website being comprised by confirming that system patches are up to date, application
hot fixes are current, and unneeded ports and services have been disabled. To do this, the
security analyst will perform a:
Which of the following is Joe attempting to complete?
Joe, a security analyst, is attempting to determine if a new server meets the security requirements
of his organization. As a step in this process, he attempts to identify a lack of security controls and
to identify common misconfigurations on the server. Which of the following is Joe attempting to
complete?
Which of the following describes how the switch in the classroom should be configured to allow for the virtual
A classroom utilizes workstations running virtualization software for a maximum of one virtual
machine per working station. The network settings on the virtual machines are set to bridged.
Which of the following describes how the switch in the classroom should be configured to allow for
the virtual machines and host workstation to connect to network resources?
which multiple TCP flags are set to 1?
Which of the following attacks initiates a connection by sending specially crafted packets in which
multiple TCP flags are set to 1?
Which of the following should the programmer use?
A Company transfers millions of files a day between their servers. A programmer for the company
has created a program that indexes and verifies the integrity of each file as it is replicated between
servers. The programmer would like to use the fastest algorithm to ensure integrity. Which of the
following should the programmer use?
Which of the following actions should the administrator perform first to correct the issue?
A system administrator is conducting baseline audit and determines that a web server is missing
several critical updates. Which of the following actions should the administrator perform first to
correct the issue?
which of the following would be the best way to accomplish this objective?
The IT department has been tasked with reducing the risk of sensitive information being shared
with unauthorized entities from computers it is saved on, without impeding the ability of the
employees to access the internet. Implementing which of the following would be the best way to
accomplish this objective?
Which of the following is the RTO?
A server crashes at 6 pm. Senior management has determined that data must be restored within
two hours of a server crash. Additionally, a loss of more than one hour worth of data is detrimental
to the company’s financial well-being. Which of the following is the RTO?
Which of the following tools is the technician MOST likely to use?
To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of
protocols and services whenever possible. In addition, the security technician is required to
monitor the types of traffic being generated. Which of the following tools is the technician MOST
likely to use?
Which of the following will be the MOST effective solution in limiting access based on this requirement?
An administrator is implementing a new management system for the machinery on the company’s
production line. One requirement is that the system only be accessible while within the production
facility. Which of the following will be the MOST effective solution in limiting access based on this
requirement?