Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security
gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the
tethered connection and corporate data is stolen. Which of the following would BEST prevent this
from occurring again?
Which of the following can be implemented if a security administrator wants only certain devices connecting to
Which of the following can be implemented if a security administrator wants only certain devices
connecting to the wireless network?
Which of the following malware types typically allows an attacker to monitor a user’s computer, is character
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
Which of the following malware types may require user interaction, does not hide itself, and is commonly ident
Which of the following malware types may require user interaction, does not hide itself, and is
commonly identified by marketing pop-ups based on browsing habits?
Which of the following is characterized by an attack against a mobile device?
Which of the following is characterized by an attack against a mobile device?
Which of the following application attacks is used against a corporate directory service where there are unkno
Which of the following application attacks is used against a corporate directory service where
there are unknown servers on the network?
Which of the following protocols allows for the LARGEST address space?
Which of the following protocols allows for the LARGEST address space?
Who should be contacted FIRST in the event of a security breach?
Who should be contacted FIRST in the event of a security breach?
Which of the following attack types has occurred?
A security administrator examines a network session to a compromised database server with a
packet analyzer. Within the session there is a repeated series of the hex character 90 (x90).
Which of the following attack types has occurred?
Which of the following is an example of a false negative?
Which of the following is an example of a false negative?