Which of the following authentication services is he MOST likely using?
Joe, a network administrator, is able to manage the backup software console by using his network
login credentials. Which of the following authentication services is he MOST likely using?
Which of the following would BEST meet this security goal?
A system administrator wants to confidentially send a user name and password list to an individual
outside the company without the information being detected by security controls. Which of the
following would BEST meet this security goal?
Which of the following choices BEST mitigates the range of risks associated with the continued use of removabl
Several departments in a corporation have a critical need for routinely moving data from one
system to another using removable storage devices. Senior management is concerned with data
loss and the introduction of malware on the network. Which of the following choices BEST
mitigates the range of risks associated with the continued use of removable storage devices?
Which of the following would be the BEST course of action for the consultant to recommend?
A retail store uses a wireless network for its employees to access inventory from anywhere in the
store. Due to concerns regarding the aging wireless network, the store manager has brought in a
consultant to harden the network. During the site survey, the consultant discovers that the network
was using WEP encryption. Which of the following would be the BEST course of action for the
consultant to recommend?
Which of the following procedures could have been implemented to aid the authorities in their investigation?
A company executive’s laptop was compromised, leading to a security breach. The laptop was
placed into storage by a junior system administrator and was subsequently wiped and re-imaged.
When it was determined that the authorities would need to be involved, there was little evidence to
present to the investigators. Which of the following procedures could have been implemented to
aid the authorities in their investigation?
Which of the following security controls is the BEST option to prevent auditors from accessing or modifying pa
An organization is implementing a password management application which requires that all local
administrator passwords be stored and automatically managed. Auditors will be responsible for
monitoring activities in the application by reviewing the logs. Which of the following security
controls is the BEST option to prevent auditors from accessing or modifying passwords in the
application?
which of the following?
Protecting the confidentiality of a message is accomplished by encrypting the message with which
of the following?
Which of the following should the company have employees acknowledge before allowing them to access the corpor
A company has recently allowed employees to take advantage of BYOD by installing WAPs
throughout the corporate office. An employee, Joe, has recently begun to view inappropriate
material at work using his personal laptop. When confronted, Joe indicated that he was never told
that he could not view that type of material on his personal laptop. Which of the following should
the company have employees acknowledge before allowing them to access the corporate WLAN
with their personal devices?
which of the following could be implemented without increasing the amount of space required at the entrance?
A security administrator is tackling issues related to authenticating users at a remote site. There
have been a large number of security incidents that resulted from either tailgating or impersonation
of authorized users with valid credentials. The security administrator has been told to implement
multifactor authentication in order to control facility access. To secure access to the remote facility,
which of the following could be implemented without increasing the amount of space required at
the entrance?
Which of the following MUST happen before the server can communicate on VLAN 12?
A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication
works fine, but VLAN 12 does not. Which of the following MUST happen before the server can
communicate on VLAN 12?