which of the following?
A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation, the
supervisor terminates an employee as a result of the suspected data loss. During the investigation, the
supervisor is absent for the interview, and little evidence can be provided form the role-based authentication
system in use by the company. The situation can be identified for future mitigation as which of the following?
what the company?
Six months into development, the core team assigned to implement a new internal piece of software must
convene to discuss a new requirement with the stake holders. A stakeholder identified a missing feature critical
to the organization, which must be implemented. The team needs to validate the feasibility of the newly
introduced requirement and ensure it does not introduce new vulnerabilities to the software and other
applications that will integrate with it. Which of the following BEST describes what the company?
Which of the following model prevents the IDS from capt…
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate-based
authentication with its users. The company uses SSL-inspecting IDS at its network boundary and is concerned
about the confidentiality of the mutual authentication. Which of the following model prevents the IDS from
capturing credentials used to authenticate users to the new service or keys to decrypt that communication?
Which of the following can be used to control specific …
Which of the following can be used to control specific commands that can be executed on a network
infrastructure device?
The access the server using RDP on a port other than th…
A server administrator needs to administer a server remotely using RDP, but the specified port is closed on the
outbound firewall on the network. The access the server using RDP on a port other than the typical registered
port for the RDP protocol?
Which of the following options will pro-vide the best p…
A company is deploying a new VoIP phone system. They require 99.999% uptime for their phone service and
are concerned about their existing data network interfering with the VoIP phone system. The core switches in
the existing data network are almost fully saturated. Which of the following options will pro-vide the best
performance and availability for both the VoIP traffic, as well as the traffic on the existing data network?
Which of the following would assist the administrator i…
A security administrator suspects that data on a server has been exhilarated as a result of un-authorized
remote access. Which of the following would assist the administrator in con-firming the suspicions? (Choose
two.)
Which of the following security measures can the admini…
The security administrator has noticed cars parking just outside of the building fence line. Which of the following
security measures can the administrator use to help protect the company’s WiFi network against war driving?
(Choose two.)
Which of the following should the technician use to vie…
A network technician is trying to determine the source of an ongoing network based attack. Which of the
following should the technician use to view IPv4 packet data on a particular internal network segment?
Which of the following allows an application to securel…
Which of the following allows an application to securely authenticate a user by receiving credentials from a web
domain?