Which of the following job responsibilities is the analyst performing?
A security analyst performs the following activities: monitors security logs, installs surveillance
cameras and analyzes trend reports. Which of the following job responsibilities is the analyst
performing? (Select TWO).
Which of the following security measures can be put in place to mitigate the issue until a new key card syst
Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it
becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters
secure areas. Which of the following security measures can be put in place to mitigate the issue
until a new key card system can be installed?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login
process. Which of the following BEST describes the email address?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login
process. Which of the following BEST describes the email address?
Which of the following BEST describes the compromised system?
An administrator is investigating a system that may potentially be compromised, and sees the
following log entries on the router.
*Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 3 packets.
*Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 6 packets.
*Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 8 packets.
Which of the following BEST describes the compromised system?
Which of the following devices is used for the transparent security inspection of network traffic…?
Which of the following devices is used for the transparent security inspection of network traffic by
redirecting user packets prior to sending the packets to the intended destination?
Which of the following is the BEST way to run the malware scanner?
A Windows-based computer is infected with malware and is running too slowly to boot and run a
malware scanner. Which of the following is the BEST way to run the malware scanner?
Which of the following should be implemented to give the appropriate access while enforcing least privilege?
A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need
access to sales. Which of the following should be implemented to give the appropriate access
while enforcing least privilege?
Which of the following BEST describes this attack?
The Chief Executive Officer (CEO) receives a suspicious voice mail warning of credit card fraud.
No one else received the voice mail. Which of the following BEST describes this attack?
which of the following?
RC4 is a strong encryption protocol that is generally used with which of the following?