A way to assure data at-rest is secure even in the event of loss or theft is to use:
A way to assure data at-rest is secure even in the event of loss or theft is to use:
Which of the following is occurring?
A security audit identifies a number of large email messages being sent by a specific user from
their company email account to another address external to the company. These messages were
sent prior to a company data breach, which prompted the security audit. The user was one of a
few people who had access to the leaked data. Review of the suspect’s emails show they consist
mostly of pictures of the user at various locations during a recent vacation. No suspicious activities
from other users who have access to the data were discovered.
Which of the following is occurring?
Which of the following protocols was used to access the server remotely?
A security analyst is reviewing firewall logs while investigating a compromised web server. The
following ports appear in the log:
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
Which of the following software features should be configured on the access points?
An organization does not want the wireless network name to be easily discovered. Which of the
following software features should be configured on the access points?
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the
computer and finds that a service called Telnet is running and connecting to an external website
over port 443. This Telnet service was found by comparing the system’s services to the list of
standard services on the company’s system image. This review process depends on:
This technique is known as:
A software developer wants to prevent stored passwords from being easily decrypted. When the
password is stored by the application, additional text is added to each password before the
password is hashed. This technique is known as:
which of the following steps of incident response does a team analyze the incident and determine steps to prev
In which of the following steps of incident response does a team analyze the incident and
determine steps to prevent a future occurrence?
Which of the following should the security technician recommend?
A security technician has been asked to recommend an authentication mechanism that will allow
users to authenticate using a password that will only be valid for a predefined time interval. Which
of the following should the security technician recommend?
Which of the following wireless encryption methods should be implemented?
A security administrator must implement a wireless encryption system to secure mobile devices’
communication. Some users have mobile devices which only support 56-bit encryption. Which of
the following wireless encryption methods should be implemented?
which of the following should be done at the beginning?
After a security incident involving a physical asset, which of the following should be done at the
beginning?