Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop&
After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the
document is no longer encrypted. Which of the following can a security technician implement to
ensure that documents stored on Joe’s desktop remain encrypted when moved to external media
or other network based storage?
Which of the following MUST be considered prior to sending data to a third party?
Acme Corp has selectively outsourced proprietary business processes to ABC Services. Due to
some technical issues, ABC services wants to send some of Acme Corp’s debug data to a third
party vendor for problem resolution. Which of the following MUST be considered prior to sending
data to a third party?
Which of the following type of authentication mechanism is this?
An organization has introduced token-based authentication to system administrators due to risk of
password compromise. The tokens have a set of numbers that automatically change every 30
seconds. Which of the following type of authentication mechanism is this?
Which of the following will BEST mitigate the risk if implemented on the switches?
A security technician at a small business is worried about the Layer 2 switches in the network
suffering from a DoS style attack caused by staff incorrectly cabling network connections between
switches.
Which of the following will BEST mitigate the risk if implemented on the switches?
Which of the following antennas would be BEST for this situation?
An administrator wants to establish a WiFi network using a high gain directional antenna with a
narrow radiation pattern to connect two buildings separated by a very long distance. Which of the
following antennas would be BEST for this situation?
Which of the following BEST describes this type of attack?
An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?
Which of the following is an XML based open standard used in the exchange of authentication and authorization
Which of the following is an XML based open standard used in the exchange of authentication and
authorization information between different parties?
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow i
Which of the following ports and protocol types must be opened on a host with a host-based
firewall to allow incoming SFTP connections?
Which of the following types of malware is on Ann’s workstation?
A user, Ann, is reporting to the company IT support group that her workstation screen is blank
other than a window with a message requesting payment or else her hard drive will be formatted.
Which of the following types of malware is on Ann’s workstation?
Which of the following controls can be implemented together to prevent data loss in the event of theft of a mo
Which of the following controls can be implemented together to prevent data loss in the event of
theft of a mobile device storing sensitive information? (Select TWO).