Which of the following solutions would mitigate this issue?
After a company has standardized to a single operating system, not all servers are immune to a
well-known OS vulnerability. Which of the following solutions would mitigate this issue?
Which of the following technologies would BEST be suited to accomplish this?
A security technician would like to obscure sensitive data within a file so that it can be transferred
without causing suspicion. Which of the following technologies would BEST be suited to
accomplish this?
Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on e
Which of the following should a company implement to BEST mitigate from zero-day malicious
code executing on employees’ computers?
Which of the following technologies provides the FASTEST revocation capability?
A company is concerned that a compromised certificate may result in a man-in-the-middle attack
against backend financial servers. In order to minimize the amount of time a compromised
certificate would be accepted by other servers, the company decides to add another validation
step to SSL/TLS connections. Which of the following technologies provides the FASTEST
revocation capability?
which of the following?
Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program
that encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same
program to create a hidden volume within the encrypted hard drive and stores the sensitive
information within the hidden volume. This is an example of which of the following? (Select TWO).
Which of the following can the technician use to verify if a system file was compromised?
A technician wants to verify the authenticity of the system files of a potentially compromised
system. Which of the following can the technician use to verify if a system file was compromised?
(Select TWO).
Which of the following has been reported by the vulnerability scan?
Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent
penetration test reveals vulnerabilities on the network. Which of the following has been reported by
the vulnerability scan?
a music application posting the name of the current song playing on the device on a social media site)?
Which of the following is a control that allows a mobile application to access and manipulate
information which should only be available by another application on the same mobile device (e.g.
a music application posting the name of the current song playing on the device on a social media
site)?
Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organizati
During a disaster recovery planning session, a security administrator has been tasked with
determining which threats and vulnerabilities pose a risk to the organization. Which of the following
should the administrator rate as having the HIGHEST frequency of risk to the organization?
Which of the following would provide the BEST environment for performing this testing?
Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety
of servers before deployment to the production environment while utilizing a limited amount of
hardware resources. Which of the following would provide the BEST environment for performing
this testing?