Which of the following should the Security Manager suggest to BEST secure this environment?
A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP
cameras with built-in web management. The Security Manager has several security guard desks
on different networks that must be able to view the cameras without unauthorized people viewing
the video as well. The selected IP camera vendor does not have the ability to authenticate users at
the camera level. Which of the following should the Security Manager suggest to BEST secure this
environment?
Which of the following switches of the ATTRIB command clears the attributes of a file?
Which of the following switches of the ATTRIB command clears the attributes of a file?
which of the following?
In single sign-on, the secondary domain needs to trust the primary domain to do which of the
following? (Select TWO).
Which of the following commands will he use to accomplish this task?
Mark has a file named DATA.TXT on the C. drive on his computer. He wants to set the hidden attribute on
the file. Which of the following commands will he use to accomplish this task?
Which of the following should the ISO consider to provide the independent functionality required by each depar
A corporation has Research and Development (R&D) and IT support teams, each requiring
separate networks with independent control of their security boundaries to support department
objectives. The corporation’s Information Security Officer (ISO) is responsible for providing firewall
services to both departments, but does not want to increase the hardware footprint within the
datacenter. Which of the following should the ISO consider to provide the independent
functionality required by each department’s IT teams?
Which of the following would be the MOST appropriate method for dealing with this issue going forward?
A manager who was attending an all-day training session was overdue entering bonus and payroll
information for subordinates. The manager felt the best way to get the changes entered while in
training was to log into the payroll system, and then activate desktop sharing with a trusted
subordinate. The manager granted the subordinate control of the desktop thereby giving the
subordinate full access to the payroll system. The subordinate did not have authorization to be in
the payroll system. Another employee reported the incident to the security team. Which of the
following would be the MOST appropriate method for dealing with this issue going forward?
What should Mark do first to resolve the issue?
Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer
and finds that the computer does not detect it. He connects other working USB devices to the port and
discovers that the USB port is not functioning. What should Mark do first to resolve the issue?
Which of the following should the auditor recommend FIRST?
After connecting to a secure payment server at https://pay.xyz.com, an auditor notices that the
SSL certificate was issued to *.xyz.com. The auditor also notices that many of the internal
development servers use the same certificate. After installing the certificate on dev1.xyz.com, one
of the developers reports misplacing the USB thumb-drive where the SSL certificate was stored.
Which of the following should the auditor recommend FIRST?
Which of the following can the administrator do in the short term to minimize the attack?
A morphed worm carrying a 0-day payload has infiltrated the company network and is now
spreading across the organization. The security administrator was able to isolate the worm
communication and payload distribution channel to TCP port 445. Which of the following can the
administrator do in the short term to minimize the attack?
What are the differences between the microprocessor of a desktop and that of a laptop?
What are the differences between the microprocessor of a desktop and that of a laptop?
Each correct answer represents a complete solution. Choose two.