Which of the following practices could be used to increase the security posture during deployment?
A recent audit has revealed weaknesses in the process of deploying new servers and network
devices. Which of the following practices could be used to increase the security posture during
deployment? (Select TWO).
Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?
Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the
company’s financial records. Which of the following security mechanism would be MOST
appropriate to confirm Joe’s suspicion?
Which of the following would BEST fit her objective?
Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure
protocol, which can utilize EAP. Which of the following would BEST fit her objective?
which of the following as a mitigation method against further attempts?
Joe analyzed the following log and determined the security team should implement which of the
following as a mitigation method against further attempts?
Host 192.168.1.123
[00:00:01]Successful Login: 015 192.168.1.123 : local
[00:00:03]Unsuccessful Login: 022 214.34.56.006 :RDP 192.168.1.124
[00:00:04]UnSuccessful Login: 010 214.34.56.006 :RDP 192.168.1.124
[00:00:07]UnSuccessful Login: 007 214.34.56.006 :RDP 192.168.1.124
[00:00:08]UnSuccessful Login: 003 214.34.56.006 :RDP 192.168.1.124
Which of the following is this an example of?
A computer supply company is located in a building with three wireless networks. The system
security team implemented a quarterly security scan and saw the following. Which of the following
is this an example of?
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following actions should Joe recommend?
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles
during the week. Further investigation by the system engineering team determined that a timed
.exe file had been uploaded to the system control console during a visit by international
contractors. Which of the following actions should Joe recommend?
Which of the following would provide the strongest protection?
A system administrator has been instructed by the head of security to protect their data at-rest.
Which of the following would provide the strongest protection?
which of the following steps is MOST important?
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-topeer network that cannot connect to the Internet. The ISSO can update the antivirus definitions
manually, but which of the following steps is MOST important?
Which of the following is the BEST service for Ann to implement?
Ann has taken over as the new head of the IT department. One of her first assignments was to
implement AAA in preparation for the company’s new telecommuting policy. When she takes
inventory of the organizations existing network infrastructure, she makes note that it is a mix of
several different vendors. Ann knows she needs a method of secure centralized access to the
company’s network resources. Which of the following is the BEST service for Ann to implement?
Which of the following BEST explains why Ann is not required to change her password?
A group policy requires users in an organization to use strong passwords that must be changed
every 15 days. Joe and Ann were hired 16 days ago. When Joe logs into the network, he is
prompted to change his password; when Ann logs into the network, she is not prompted to change
her password. Which of the following BEST explains why Ann is not required to change her
password?