Which of the following best practices should a security manager do to manage the risks of these attack vectors
New zero-day attacks are announced on a regular basis against a broad range of technology
systems. Which of the following best practices should a security manager do to manage the risks
of these attack vectors? (Select TWO).
Which of the following items are configured on a user workstation for wireless networking?
Which of the following items are configured on a user workstation for wireless networking?
Each correct answer represents a complete solution. Choose two.
which of the following attack combinations?
A WAF without customization will protect the infrastructure from which of the following attack
combinations?
Which of the following is the MOST important to be considered before going ahead with the service?
Company ABC is planning to outsource its Customer Relationship Management system (CRM)
and marketing / leads management to Company XYZ.
Which of the following is the MOST important to be considered before going ahead with the
service?
Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer
Which of the following technologies is used to detect unauthorized attempts to access and manipulate
computer systems locally or through the Internet or an intranet?
Which of the following would the security engineer MOST likely implement to secure this connection?
The Linux server at Company A hosts a graphical application widely used by the company
designers. One designer regularly connects to the server from a Mac laptop in the designer’s
office down the hall. When the security engineer learns of this it is discovered the connection is not
secured and the password can easily be obtained via network sniffing. Which of the following
would the security engineer MOST likely implement to secure this connection?
Linux Server: 192.168.10.10/24
Mac Laptop: 192.168.10.200/24
Doing so will place the target icon at the clicked spot
Which of the following should occur?
A data breach has occurred at Company A and as a result, the Chief Information Officer (CIO) has
resigned. The CIO’s laptop, cell phone and PC were all wiped of data per company policy. A
month later, prosecutors in litigation with Company A suspect the CIO knew about the data breach
long before it was discovered and have issued a subpoena requesting all the CIO’s email from the
last 12 months. The corporate retention policy recommends keeping data for no longer than 90
days. Which of the following should occur?
Which of the following cryptographic improvements should be made to the current architecture to achieve the st
A security administrator at a Lab Company is required to implement a solution which will provide
the highest level of confidentiality possible to all data on the lab network.
The current infrastructure design includes:
Two-factor token and biometric based authentication for all users
Attributable administrator accounts
Logging of all transactions
Full disk encryption of all HDDs
Finely granular access controls to all resources
Full virtualization of all servers
The use of LUN masking to segregate SAN data
Port security on all switches
The network is protected with a firewall implementing ACLs, a NIPS device, and secured wireless
access points.
Which of the following cryptographic improvements should be made to the current architecture to
achieve the stated goals?
Which of the following hardware uses flash memory technology?
Which of the following hardware uses flash memory technology?