Which of the following policies should be enforced to prevent this from happening?
A recent review of accounts on various systems has found that after employees’ passwords are
required to change they are recycling the same password as before. Which of the following
policies should be enforced to prevent this from happening? (Select TWO).
Which of the following password enforcement policies would have mitigated this issue?
An organizations’ security policy requires that users change passwords every 30 days. After a
security audit, it was determined that users were recycling previously used passwords. Which of
the following password enforcement policies would have mitigated this issue?
Which of the following is this an example of?
The system administrator is reviewing the following logs from the company web server:
12:34:56 GET /directory_listing.php?user=admin&pass=admin1
12:34:57 GET /directory_listing.php?user=admin&pass=admin2
12:34:58 GET /directory_listing.php?user=admin&pass=1admin
12:34:59 GET /directory_listing.php?user=admin&pass=2admin
Which of the following is this an example of?
Which of the following should the security administrator implement?
A security administrator must implement a system that will support and enforce the following file
system access control model:
FILE NAME SECURITY LABEL
Employees.doc Confidential
Salary.xls Confidential
OfficePhones.xls Unclassified
PersonalPhones.xls Restricted
Which of the following should the security administrator implement?
Which of the following management controls should be introduced to the branch office to improve their state of
An overseas branch office within a company has many more technical and non-technical security
incidents than other parts of the company. Which of the following management controls should be
introduced to the branch office to improve their state of security?
Which of the following security techniques would be BEST suited for this?
A large multinational corporation with networks in 30 countries wants to establish an
understanding of their overall public-facing network attack surface. Which of the following security
techniques would be BEST suited for this?
Which of the following controls should critical application servers implement to protect themselves from other
Which of the following controls should critical application servers implement to protect themselves
from other potentially compromised application services?
Which of the following is a directional antenna that can be used in point-to-point or point-to-multipoint WiFi
Which of the following is a directional antenna that can be used in point-to-point or point-to-multipoint WiFi communication systems? (Select TWO).
Which of the following would be a customer concern if the offshore staff had direct access to their data?
A large bank has moved back office operations offshore to another country with lower wage costs
in an attempt to improve profit and productivity. Which of the following would be a customer
concern if the offshore staff had direct access to their data?
Which of the following are examples of detective controls?
Which of the following are examples of detective controls?