which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?
Which of the following would be Pete’s BEST option?
Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the
downtime in the event of a disaster, but does not have the budget approval to implement or
maintain an offsite location that ensures 99.99% availability. Which of the following would be
Pete’s BEST option?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher
which will encrypt 8 bits at a time before sending the data across the network. Which of the
following has Sara selected?
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
Which of the following is the BEST approach to perform risk mitigation of user access control
rights?
Which of the following devices is BEST suited for servers that need to store private keys?
Which of the following devices is BEST suited for servers that need to store private keys?
All of the following are valid cryptographic hash functions EXCEPT:
All of the following are valid cryptographic hash functions EXCEPT:
why is input validation important?
In regards to secure coding practices, why is input validation important?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following would be used when a higher level of security is desired for encryption key
storage?
Which of the following log types would the administrator check?
A security administrator needs to determine which system a particular user is trying to login to at
various times of the day. Which of the following log types would the administrator check?
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized acce
Which of the following MUST be updated immediately when an employee is terminated to prevent
unauthorized access?