Which of the following should the security administrator do before applying the ACL?
The security administrator is receiving numerous alerts from the internal IDS of a possible
Conficker infection spreading through the network via the Windows file sharing services. Given the
size of the company which deploys over 20,000 workstations and 1,000 servers, the security
engineer believes that the best course of action is to block the file sharing service across the
organization by placing ACLs on the internal routers.
Which of the following should the security administrator do before applying the ACL?
Which of the following should the technician do FIRST to resolve the issue?
A physician has notified the technician of a lab record that was improperly routed to a patient file.
Which of the following should the technician do FIRST to resolve the issue?
Which of the following technologies is used to connect public networks using POTS lines?
Which of the following technologies is used to connect public networks using POTS lines?
Which of the following tools is used to monitor the status of computer security settings and services and to s
Which of the following tools is used to monitor the status of computer security settings and services
and to specify the problem using a pop- up notification balloon?
Which of the following would MOST likely need to be implemented and configured on the company’s perimeter ne
A company currently does not use any type of authentication or authorization service for remote
access. The new security policy states that all remote access must be locked down to only
authorized personnel. The policy also dictates that only authorized external networks will be
allowed to access certain internal resources.
Which of the following would MOST likely need to be implemented and configured on the
company’s perimeter network to comply with the new security policy? (Select TWO).
which of the following is the BEST way to store passwords?
According to best practices, which of the following is the BEST way to store passwords?
How many colors you can have in a 24-bit color system?
How many colors you can have in a 24-bit color system?
Which of the following protocols is widely used for setting up and tearing down multimedia communication sessi
Which of the following protocols is widely used for setting up and tearing down multimedia
communication sessions such as voice and video calls over the Internet (VoIP)?
Which of the following displays an example of a buffer overflow attack?
Which of the following displays an example of a buffer overflow attack?
Which of the following requires external disclosure of PHI under HIPAA?
Which of the following requires external disclosure of PHI under HIPAA?