A security guard has informed the Chief Information Security Officer that a person with a tablet has been
walking around the building. The guard also noticed strange white markings in different areas of the parking
Which of the following types of attacks is the person attempting?
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL
connections with random remote hosts on the Internet. Which of the following should be used in the code?
The Chief Technology Officer (CTO) of a company, Ann, is putting together a hardware budget for the next 10
years. She is asking for the average lifespan of each hardware device so that she is able to calculate when she
will have to replace each device. Which of the following categories BEST describes what she is looking for?
A software development company needs to share information between two remote servers, using encryption to
protect it. A programmer suggests developing a new encryption protocol, arguing that using an unknown
protocol with secure, existing cryptographic algorithm libraries will provide strong encryption without being
susceptible to attacks on other known protocols. Which of the following summarizes the BEST response to the
A technician must configure a firewall to block external DNS traffic from entering a network. Which of the
following ports should they block on the firewall?
An organization relies heavily on an application that has a high frequency of security updates. At present, the
security team only updates the application on the first Monday of each month, even though the security updates
are released as often as twice a week. Which of the following would be the BEST method of updating this
A Security Officer on a military base needs to encrypt several smart phones that will be going into the field.
Which of the following encryption solutions should be deployed in this situation?
Which of the following is the summary of loss for a given year?
Which of the following is the GREATEST risk to a company by allowing employees to physically bring their
personal smartphones to work?
A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home
offices and while traveling, and a high amount of wireless mobile use is expected. To protect the laptops while
connected to untrusted wireless networks, which of the following would be the BEST method for reducing the
risk of having the laptops compromised?