Which of the following should be executed on the router to prevent access via these ports?
A vulnerability assessment indicates that a router can be accessed from default port 80 and
default port 22. Which of the following should be executed on the router to prevent access via
these ports? (Select TWO).
Which of the following sets of commands would meet this requirement?
Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be
accessed using the same password. The company’s network device security policy mandates that
at least one virtual terminal have a different password than the other virtual terminals. Which of the
following sets of commands would meet this requirement?
Which of the following could the technician use to prepare the report?
Joe, an employee, was escorted from the company premises due to suspicion of revealing trade
secrets to a competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s
integrity scan. Which of the following could the technician use to prepare the report? (Select
TWO).
Which of the following types of authorization could be utilized to trigger write access for Joe when Ann is ab
Ann has read and write access to an employee database, while Joe has only read access. Ann is
leaving for a conference.
Which of the following types of authorization could be utilized to trigger write access for Joe when
Ann is absent?
which of the following is a security control that should be in place?
Human Resources suspects an employee is accessing the employee salary database. The
administrator is asked to find out who it is. In order to complete this task, which of the following is a
security control that should be in place?
Which of the following should the administrator implement?
An administrator finds that non-production servers are being frequently compromised, production
servers are rebooting at unplanned times and kernel versions are several releases behind the
version with all current security fixes. Which of the following should the administrator implement?
Which of the following would mitigate and secure the auditors finding?
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts
were later identified as contractors’ accounts who would be returning in three months and would
need to resume the activities. Which of the following would mitigate and secure the auditors
finding?
Which of the following should be implemented in order to compliment password usage and smart cards?
Ann, the security administrator, wishes to implement multifactor security. Which of the following
should be implemented in order to compliment password usage and smart cards?
Which of the following methods should the company consider to secure this data in the future?
Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles
of a particular vendor. Which of the following methods should the company consider to secure this
data in the future?
Which of the following methods should the system administrator implement?
A new intern was assigned to the system engineering department, which consists of the system
architect and system software developer’s teams. These two teams have separate privileges. The
intern requires privileges to view the system architectural drawings and comment on some
software development projects. Which of the following methods should the system administrator
implement?