The access the server using RDP on a port other than the typical registered port for the RDP protocol?
A server administrator needs to administer a server remotely using RDP, but the specified port is
closed on the outbound firewall on the network. The access the server using RDP on a port other
than the typical registered port for the RDP protocol?
Which of the following can be used to control specific commands that can be executed on a network infrastructu
Which of the following can be used to control specific commands that can be executed on a
network infrastructure device?
Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificatebased authentication with its users. The company uses SSL-inspecting IDS at its network
boundary and is concerned about the confidentiality of the mutual authentication. Which of the
following model prevents the IDS from capturing credentials used to authenticate users to the new
service or keys to decrypt that communication?
what the company?
Six months into development, the core team assigned to implement a new internal piece of
software must convene to discuss a new requirement with the stake holders. A stakeholder
identified a missing feature critical to the organization, which must be implemented. The team
needs to validate the feasibility of the newly introduced requirement and ensure it does not
introduce new vulnerabilities to the software and other applications that will integrate with it. Which
of the following BEST describes what the company?
which of the following?
A company is investigating a data compromise where data exfiltration occurred. Prior to the
investigation, the supervisor terminates an employee as a result of the suspected data loss.
During the investigation, the supervisor is absent for the interview, and little evidence can be
provided form the role-based authentication system in use by the company. The situation can be
identified for future mitigation as which of the following?
Which of the following methods should the security administrator select the best balances security and efficie
A security administrator needs an external vendor to correct an urgent issue with an organization’s
physical access control system (PACS). The PACS does not currently have internet access
because it is running a legacy operation system. Which of the following methods should the
security administrator select the best balances security and efficiency?
Which of the following is the MOST critical for immediate recovery?
A datacenter manager has been asked to prioritize critical system recovery priorities. Which of the
following is the MOST critical for immediate recovery?
Which of the following techniques can be bypass a user or computer’s web browser privacy settings?
Which of the following techniques can be bypass a user or computer’s web browser privacy
settings? (Select Two)
When designing a web based client server application with single application server and database cluster backe
When designing a web based client server application with single application server and database
cluster backend, input validation should be performed:
Which of the following delineates why it is important to perform egress filtering and monitoring on Internet c
Which of the following delineates why it is important to perform egress filtering and monitoring on
Internet connected security zones of interfaces on a firewall?