The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-si
The BEST methods for a web developer to prevent the website application code from being
vulnerable to cross-site request forgery (XSRF) are to: (Select TWO).
Which of the following is an authentication method Jane should use?
Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?
Which of the following does this illustrate?
Computer evidence at a crime scene is documented with a tag stating who had possession of the
evidence at a given time.
Which of the following does this illustrate?
Which of the following is BEST suited when assigning user rights to individuals in the sales department?
A network administrator is configuring access control for the sales department which has high
employee turnover. Which of the following is BEST suited when assigning user rights to individuals
in the sales department?
Which of the following is being tested when a company’s payroll server is powered off for eight hours?
Which of the following is being tested when a company’s payroll server is powered off for eight
hours?
Which of the following BEST describes this exploit?
A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been
created for a frequently used application. She notifies the software vendor and asks them for
remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability.
Which of the following BEST describes this exploit?
which of the following?
A security administrator has concerns about new types of media which allow for the mass
distribution of personal comments to a select group of people. To mitigate the risks involved with
this media, employees should receive training on which of the following?
Which of the following processes could MOST effectively mitigate these risks?
A network administrator is responsible for securing applications against external attacks. Every
month, the underlying operating system is updated. There is no process in place for other software
updates.
Which of the following processes could MOST effectively mitigate these risks?
Which of the following practices is being implemented?
A software developer is responsible for writing the code on an accounting application. Another
software developer is responsible for developing code on a system in human resources. Once a
year they have to switch roles for several weeks.
Which of the following practices is being implemented?
Which of the following protocols would be the MOST secure?
A network engineer is designing a secure tunneled VPN. Which of the following protocols would
be the MOST secure?