Which of the following describes the type of attack that was occurring?
Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the
CEO’s office with various connected cables from the office. Which of the following describes
the type of attack that was occurring?
Which of the following BEST describes this new network?
A security administrator is segregating all web-facing server traffic from the internal network
and restricting it to a single interface on a firewall. Which of the following BEST describes
this new network?
Which of the following was based on a previous X.500 specification and allows either unencrypted authenticatio
Which of the following was based on a previous X.500 specification and allows either
unencrypted authentication or encrypted authentication through the use of TLS?
Which of the following is the team performing?
The Quality Assurance team is testing a new third party developed application. The Quality
team does not have any experience with the application. Which of the following is the team
performing?
Which of the following has a storage root key?
Which of the following has a storage root key?
Which of the following controls will allow the organization to provide automated notification of item removal?
A datacenter requires that staff be able to identify whether or not items have been removed
from the facility. Which of the following controls will allow the organization to provide
automated notification of item removal?
This caused the electronic locks on the datacenter door to release because the:
A malicious person gained access to a datacenter by ripping the proximity badge reader off
the wall near the datacenter entrance. This caused the electronic locks on the datacenter
door to release because the:
which of the following?
The concept of rendering data passing between two points over an IP based network
impervious to all but the most sophisticated advanced persistent threats is BEST categorized
as which of the following?
Which of the following is the MOST likely cause for this issue?
On Monday, all company employees report being unable to connect to the corporate
wireless network, which uses 802.1x with PEAP. A technician verifies that no configuration
changes were made to the wireless network and its supporting infrastructure, and that there
are no outages. Which of the following is the MOST likely cause for this issue?
Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to access an acc
Which of the following would BEST deter an attacker trying to brute force 4-digit PIN
numbers to access an account at a bank teller machine?