Which of the following rules would accomplish this task?
A network administrator wants to block both DNS requests and zone transfers coming from
outside IP addresses. The company uses a firewall which implements an implicit allow and is
currently configured with the following ACL applied to its external interfacE.
PERMIT TCP ANY ANY 80
PERMIT TCP ANY ANY 443
Which of the following rules would accomplish this task? (Select TWO).
Which of the following attacks would cause all mobile devices to lose their association with corporate access
Which of the following attacks would cause all mobile devices to lose their association with
corporate access points while the attack is underway?
Which of the following can be implemented?
An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized
while the computer is in use. Which of the following can be implemented?
Which of the following risks is MOST likely to affect the business on a day-to-day basis?
A company is looking to improve their security posture by addressing risks uncovered by a recent
penetration test. Which of the following risks is MOST likely to affect the business on a day-to-day
basis?
which of the following attacks?
Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential
customer information in a recycle bin without shredding it first. This is MOST likely to increase the
risk of loss from which of the following attacks?
Which of the following could BEST prevent this issue from occurring again?
A recently installed application update caused a vital application to crash during the middle of the
workday. The application remained down until a previous version could be reinstalled on the
server, and this resulted in a significant loss of data and revenue.
Which of the following could BEST prevent this issue from occurring again?
Which of the following BEST addresses this concern?
A security administrator wishes to increase the security of the wireless network. Which of the
following BEST addresses this concern?
Which of the following risk mitigation strategies is MOST important to the security manager?
The system administrator has deployed updated security controls for the network to limit risk of
attack. The security manager is concerned that controls continue to function as intended to
maintain appropriate security posture.
Which of the following risk mitigation strategies is MOST important to the security manager?
Which of the following should the administrator use to test the patching process quickly and often?
A company is about to release a very large patch to its customers. An administrator is required to
test patch installations several times prior to distributing them to customer PCs.
Which of the following should the administrator use to test the patching process quickly and often?
Which of the following will MOST increase the security of the passwords?
An auditing team has found that passwords do not meet best business practices. Which of the
following will MOST increase the security of the passwords? (Select TWO).