A system administrator must configure the company’s authentication system to ensure that users will be unable
to reuse the last ten passwords within a six months period. Which of the following settings must be configured?
While responding to an incident on a new Windows server, the administrator needs to disable unused services.
Which of the following commands can be used to see processes that are listening on a TCP port?
Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is called:
A security manager is preparing the training portion of an incident plan. Which of the following job roles should
receive training on forensics, chain of custody, and the order of volatility?
After disabling SSID broadcast, a network administrator still sees the wireless network listed in available
networks on a client laptop. Which of the following attacks may be occurring?
A network was down for several hours due to a contractor entering the premises and plugging both ends of a
network cable into adjacent network jacks. Which of the following would have prevented the network outage?
During a code review a software developer discovers a security risk that may result in hundreds of hours of
rework. The security team has classified these issues as low risk. Executive management has decided that the
code will not be rewritten. This is an example of:
A developer needs to utilize AES encryption in an application but requires the speed of encryption and
decryption to be as fast as possible. The data that will be secured is not sensitive so speed is valued over
encryption complexity. Which of the following would BEST satisfy these requirements?
An administrator needs to protect against downgrade attacks due to various vulnerabilities in SSL/TLS. Which
of the following actions should be performed? (Choose two.)