Which of the following can be implemented to increase s…
An administrator notices that former temporary employees’ accounts are still active on a domain.
Which of the following can be implemented to increase security and prevent this from happening?
Which of the following would mitigate and secure the au…
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts were later
identified as contractors’ accounts who would be returning in three months and would need to resume the
activities. Which of the following would mitigate and secure the auditors finding?
Which of the following can the CTO implement requiring …
The Chief Technology Officer (CTO) wants to improve security surrounding storage of customer passwords.
The company currently stores passwords as SHA hashes. Which of the following can the CTO implement
requiring the LEAST change to existing systems?
which of the following as a mitigation method against f…
Joe analyzed the following log and determined the security team should implement which of the following as a
mitigation method against further attempts?
Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local
[00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124
[00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124[00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124
[00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124
Which of the following services should be disabled to e…
A new web server has been provisioned at a third party hosting provider for processing credit card transactions.
The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389
are in a `listening’ state. No other ports are open. Which of the following services should be disabled to ensure
secure communications?
Which of the following should be disabled to mitigate t…
During a routine audit a web server is flagged for allowing the use of weak ciphers. Which of the following
should be disabled to mitigate this risk? (Choose two.)
Which of the following should be executed on the router…
A vulnerability assessment indicates that a router can be accessed from default port 80 and default port 22.
Which of the following should be executed on the router to prevent access via these ports? (Choose two.)
Which of the following actions would BEST accomplish th…
A security technician is attempting to improve the overall security posture of an internal mail server. Which of
the following actions would BEST accomplish this goal?
Which of the following lines in the user’s history log …
The security administrator is analyzing a user’s history file on a Unix server to determine if the user was
attempting to break out of a rootjail. Which of the following lines in the user’s history log shows evidence that
the user attempted to escape the rootjail?
Which of the following log types would the administrato…
A security administrator needs to determine which system a particular user is trying to login to at various times
of the day. Which of the following log types would the administrator check?