Which of the following can the security administrator determine from the above information?
The helpdesk is receiving multiple calls about slow and intermittent Internet access from the
finance department. The network administrator reviews the tickets and compiles the following
information for the security administrator:
——
Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0
Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0
Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0
All callers are connected to the same switch and are routed by a router with five built-in interfaces.
The upstream router interface’s MAC is 00-01-42-32-ab-1a
——
The security administrator brings a laptop to the finance office, connects it to one of the wall jacks,
starts up a network analyzer, and notices the following:
09:05:10.937590 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)
09:05:15.934840 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)
09:05:19.931482 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)
Which of the following can the security administrator determine from the above information?
Which of the following should be responsible for the firewall password in a medical facility?
Which of the following should be responsible for the firewall password in a medical facility?
Where will you see the error message?
You work as an IT Technician for McNeil Inc. A user informs you that an error message appeared in
the morning when he turned on his computer; however, he does not remember it exactly. Where
will you see the error message?
Which of the following has the GREATEST impact on the ability to fulfill the e-discovery request?
On Monday, the Chief Information Officer (CIO) of a state agency received an e-discovery request
for the release of all emails sent and received by the agency board of directors for the past five
years. The CIO has contacted the email administrator and asked the administrator to provide the
requested information by end of day on Friday. Which of the following has the GREATEST impact
on the ability to fulfill the e-discovery request?
Which of the following defines when someone attempts to gain access to sensitive information of a top hospital
Which of the following defines when someone attempts to gain access to sensitive information of a
top hospital executive through email?
Which of the following is a fiber connector type?
Which of the following is a fiber connector type?
Which of the following is also known as palmtop computer?
Which of the following is also known as palmtop computer?
Which of the following terms refers to an anti-virus software file that is updated from time to time to protec
Which of the following terms refers to an anti-virus software file that is updated from time to time
to protect a computer from new viruses?
Which of the following are the major risks the security administrator should report back to the CIO?
A company is evaluating a new marketing strategy involving the use of social networking sites to
reach its customers. The marketing director wants to be able to report important company news,
product updates, and special promotions on the social websites.
After an initial and successful pilot period, other departments want to use the social websites to
post their updates as well.
The Chief Information Officer (CIO) has asked the company security administrator to document
three negative security impacts of allowing IT staff to post work related information on such
websites.
Which of the following are the major risks the security administrator should report back to the CIO?
(Select THREE).
Which of the following is a program that data mines a machine and sends the data out to a host?
Which of the following is a program that data mines a machine and sends the data out to a host?