Which of the following should the security administrator implement to limit web traffic based on country of or
Which of the following should the security administrator implement to limit web traffic based on
country of origin? (Select THREE).
Which of the following does this prevent?
Several bins are located throughout a building for secure disposal of sensitive information.
Which of the following does this prevent?
Which of the following is MOST likely affected?
Matt, a developer, recently attended a workshop on a new application. The developer installs the
new application on a production system to test the functionality. Which of the following is MOST
likely affected?
which of the following?
Sara, a company’s security officer, often receives reports of unauthorized personnel having
access codes to the cipher locks of secure areas in the building. Sara should immediately
implement which of the following?
Which of the following would be BEST suited for this task?
Mike, a network administrator, has been asked to passively monitor network traffic to the
company’s sales websites. Which of the following would be BEST suited for this task?
Which of the following activities is MOST appropriate?
Mike, a security professional, is tasked with actively verifying the strength of the security controls
on a company’s live modem pool. Which of the following activities is MOST appropriate?
which of the following?
Users at a company report that a popular news website keeps taking them to a web page with
derogatory content. This is an example of which of the following?
Which of the following aspects of PKI BEST ensures the identity of the sender?
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never
sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?
Which of the following is designed to stop an intrusion on a specific server?
Jane, a security administrator, has observed repeated attempts to break into a server. Which of
the following is designed to stop an intrusion on a specific server?
How could this BEST be accomplished?
Matt, the IT Manager, wants to create a new network available to virtual servers on the same
hypervisor, and does not want this network to be routable to the firewall. How could this BEST be
accomplished?