Which of the following should Jane perform?
Jane has recently implemented a new network design at her organization and wishes to passively
identify security issues with the new network. Which of the following should Jane perform?
which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls at the
company’s demarc as part of the initiation of configuration management processes. One of the
network technicians asks the security technician to explain the access control type found in a
firewall. With which of the following should the security technician respond?
Which of the following solutions BEST relates to the host authentication protocol within the company’s e
Jane, a security administrator, has been tasked with explaining authentication services to the
company’s management team. The company runs an active directory infrastructure. Which of the
following solutions BEST relates to the host authentication protocol within the company’s
environment?
Which of the following should Pete implement to BEST achieve this goal?
Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked
only on all computers that do credit card transactions. Which of the following should Pete
implement to BEST achieve this goal?
Which of the following devices would BEST achieve this goal?
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling
web sites. Which of the following devices would BEST achieve this goal?
Which of the following would BEST address this?
Pete, the system administrator, wishes to monitor and limit users’ access to external websites.
Which of the following would BEST address this?
Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP
addresses on the internal interface of the firewall to be translated to one public IP address on the
external interface of the same firewall. Which of the following should Sara configure?
Which of the following encryption methods offers this capability?
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the
same level of encryption strength with a lower key length than is typically necessary. Which of the
following encryption methods offers this capability?
Which of the following is the ALE that Sara should report to management for a security breach?
Sara, a security analyst, is trying to prove to management what costs they could incur if their
customer database was breached. This database contains 250 records with PII. Studies show that
the cost per record for a breach is $300. The likelihood that their database would be breached in
the next year is only 5%. Which of the following is the ALE that Sara should report to management
for a security breach?
Methods to test the responses of software and web applications to unusual or unexpected inputs is known as:
Methods to test the responses of software and web applications to unusual or unexpected inputs
is known as: