Which of the following should be configured in the new …
An application developer needs to allow employees to use their network credentials to access a new application
being developed. Which of the following should be configured in the new application to enable this functionality?
Which of the following would be the best way to prevent…
A security administrator is reviewing logs and notices multiple attempts to access the HVAC controls by a
workstation with an IP address from the open wireless network. Which of the following would be the best way to
prevent this type of attack from occurring again?
which of the following types of attack is this applicat…
A programmer has allocated a 32-bit variable to store the results of an operation between two user supplied 4
byte operands.
To which of the following types of attack is this application susceptible?
Which of the following should the consultant do in orde…
An outside security consultant produces a report of several vulnerabilities for a particular server. Upon further
investigation, it determines that the vulnerability reported does not apply to the platform the server is running
on.
Which of the following should the consultant do in order to produce more accurate results?
which of the following?
RC4 is a strong encryption protocol that is general used with which of the following?
Which of the following could be used?
An administrator must select an algorithm to encrypt data at rest. Which of the following could be used?
Which of the following can take advantage of man-in-the…
Which of the following can take advantage of man-in-the-middle techniques to prevent data exfiltration?
Which of the following options could improve the safety…
A datacenter has suffered repeated burglaries which led to equipment theft and arson. In the past, the thieves
have demonstrated a determination to bypass any installed safeguards. After mantraps were installed to
prevent tailgating, the thieves crashed through the wall of datacenter with a vehicle after normal business
hours. Which of the following options could improve the safety and security of the datacenter further? (Choose
two)
Which of the following design elements would be used to…
An administrator is configuring a network for all users in a single building. Which of the following design
elements would be used to segment the network based on organizational groups? (Choose two)
Which of the following should the technician implement?
A security technician wants to implement stringent security controls over web traffic by restricting the client
source TCP ports allowed through the corporate firewall. Which of the following should the technician
implement?