Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to access an acc
Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to
access an account at a bank teller machine?
Which of the following, when used together, would BEST prevent users from reusing their existing password?
An administrator discovers that many users have used their same passwords for years even
though the network requires that the passwords be changed every six weeks. Which of the
following, when used together, would BEST prevent users from reusing their existing password?
(Select TWO).
Which of the following controls should be used together to prevent this from occurring?
A recent audit has discovered that at the time of password expiration clients are able to recycle the
previous credentials for authentication. Which of the following controls should be used together to
prevent this from occurring? (Select TWO).
Which of the following authentication services is being used?
A system administrator is configuring UNIX accounts to authenticate against an external server.
The configuration file asks for the following information DC=ServerName and DC=COM. Which of
the following authentication services is being used?
which of the following?
In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following?
Which of the following network design elements allows for many internal devices to share one public IP address
Which of the following network design elements allows for many internal devices to share one
public IP address?
Which of the following components of an all-in-one security appliance would MOST likely be configured in order
Which of the following components of an all-in-one security appliance would MOST likely be
configured in order to restrict access to peer-to-peer file sharing websites?
which of the following techniques supports availability?
When considering a vendor-specific vulnerability in critical industrial control systems which of the
following techniques supports availability?
which of the following information is MOST likely required?
During the information gathering stage of a deploying role-based access control model, which of
the following information is MOST likely required?
Which of the following is the BEST method to prevent such activities in the future?
The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a
database administrator performing several other job functions within the company. Which of the
following is the BEST method to prevent such activities in the future?