Which of the following will Ann need to use to verify the validity’s of Joe’s certificate?
Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use
to verify the validity’s of Joe’s certificate? (Select TWO).
Which of the following should be implemented during the authorization stage?
A technician wants to implement a dual factor authentication system that will enable the
organization to authorize access to sensitive systems on a need-to-know basis. Which of the
following should be implemented during the authorization stage?
Which of the following can the researcher do to determine if the file is malicious in nature?
A security researcher wants to reverse engineer an executable file to determine if it is malicious.
The file was found on an underused server and appears to contain a zero-day exploit. Which of
the following can the researcher do to determine if the file is malicious in nature?
Which of the following would BEST describe this type of attack?
A recent spike in virus detections has been attributed to end-users visiting www.compnay.com.
The business has an established relationship with an organization using the URL of
www.company.com but not with the site that has been causing the infections. Which of the
following would BEST describe this type of attack?
Which of the following should be implemented to secure the devices without risking availability?
A company has proprietary mission critical devices connected to their network which are
configured remotely by both employees and approved customers. The administrator wants to
monitor device security without changing their baseline configuration. Which of the following
should be implemented to secure the devices without risking availability?
Which of the following would BEST address this desire?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding
data and network security, the administrator desires to provide network access for this group only.
Which of the following would BEST address this desire?
Which of the following is a security concern regarding users bringing personally-owned devices that they conne
Which of the following is a security concern regarding users bringing personally-owned devices
that they connect to the corporate network?
Which of the following will address this requirement?
Due to issues with building keys being duplicated and distributed, a security administrator wishes
to change to a different security control regarding a restricted area. The goal is to provide access
based upon facial recognition. Which of the following will address this requirement?
Which of the following would BEST address the administrator’s concerns?
A security administrator has concerns regarding employees saving data on company provided
mobile devices. Which of the following would BEST address the administrator’s concerns?
which of the following concepts?
Identifying residual risk is MOST important to which of the following concepts?