Which of the following security techniques is MOST appropriate to do this?
The information security technician wants to ensure security controls are deployed and functioning
as intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?
Which of the following should the company configure to protect the servers from the user devices?
A small company can only afford to buy an all-in-one wireless router/switch. The company has 3
wireless BYOD users and 2 web servers without wireless access. Which of the following should
the company configure to protect the servers from the user devices? (Select TWO).
Which of the following poses the greatest risk with this integration?
Users can authenticate to a company’s web applications using their credentials from a popular
social media site. Which of the following poses the greatest risk with this integration?
Which of the following would BEST prove the success of the program?
A security team has established a security awareness program. Which of the following would
BEST prove the success of the program?
Which of the following achieves this goal?
A company needs to receive data that contains personally identifiable information. The company
requires both the transmission and data at rest to be encrypted. Which of the following achieves
this goal? (Select TWO).
Which of the following methods would BEST accomplish this goal?
An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to combine the security controls of some of the network devices in the
organization. Which of the following methods would BEST accomplish this goal?
Which of the following would allow the organization to divide a Class C IP address range into several ranges?
Which of the following would allow the organization to divide a Class C IP address range into
several ranges?
Which of the following will ensure the administrator is notified in a timely manner in the future?
The security administrator is currently unaware of an incident that occurred a week ago. Which of
the following will ensure the administrator is notified in a timely manner in the future?
Which of the following should be configured on the client to fix this issue?
An access point has been configured for AES encryption but a client is unable to connect to it.
Which of the following should be configured on the client to fix this issue?
Which of the following should the system administrator implement to accomplish this task?
The system administrator is tasked with changing the administrator password across all 2000
computers in the organization. Which of the following should the system administrator implement
to accomplish this task?