Which of the following control types BEST explains this anomaly?
Matt, an account manager, arrives at work early in the morning and cannot log into his
workstation. He calls the help desk an hour later to open a trouble ticket, but they tell him there is
nothing wrong with his account. Matt tries his login once more and is granted access. Which of the
following control types BEST explains this anomaly?
Which of the following would ensure confidentiality and authorization to the management interface of a router?
Which of the following would ensure confidentiality and authorization to the management interface
of a router?
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following concepts BEST explains the support for fraud detection?
A security technician is attempting to explain why some of the company policies should be
changed for high risk IT positions. Which of the following concepts BEST explains the support for
fraud detection?
which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls at the
company’s demarc as part of the initiation of configuration management processes. One of the
network technicians asks the security technician to explain the access control type found in a
firewall. With which of the following should the security technician respond?
Which of the following are smart cards?
Sara, a security administrator, has been tasked with explaining smart cards to the company’s
management team. Which of the following are smart cards? (Select TWO).
Which of the following solutions BEST relates to the host authentication protocol within the company’s envir
Jane, a security administrator, has been tasked with explaining authentication services to the
company’s management team. The company runs an active directory infrastructure. Which of the
following solutions BEST relates to the host authentication protocol within the company’s
environment?
Which of the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x I
Jane, a security architect, is implementing security controls throughout her organization. Which of
the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x
Impact?
which of the following?
The information security department regularly walks the campus and around the buildings looking
for unauthorized open wireless networks. This is an example of which of the following?
Which of the following would Mike MOST likely implement?
The lobby of the hotel allows users to plug in their laptops to access the Internet. This network is
also used for the IP based phones in the hotel lobby. Mike, the security engineer, wants to secure
the phones so that guests cannot electronically eavesdrop on other guests. Which of the following
would Mike MOST likely implement?