Which of the following is the MOST important the securi…
A security manager is discussing change in the security posture of the network, if a proposed application is
approved for deployment. Which of the following is the MOST important the security manager must rely upon to
help make this determination?
Which of the following Best describes this type of attack?
A company has identified a watering hole attack. Which of the following Best describes this type of attack?
Which of the following would be used to allow a subset …
Which of the following would be used to allow a subset of traffic from a wireless network to an internal network?
Which of the following can be used to ensure that sensi…
Which of the following can be used to ensure that sensitive records stored on a backend server can only be
accessed by a front end server with the appropriate record key?
Which of the following metrics is important for measuri…
Which of the following metrics is important for measuring the extent of data required during backup and
recovery?
Which of the following would BEST prevent these issues …
Mobile tablets are used by employees on the sales floor to access customer data. Ann a customer recently
reported that another customer was able to access her personal information on the tablet after the employee
left the area. Which of the following would BEST prevent these issues from reoccurring?
Which of the following is the MOST likely cause of this…
A business has recently adopted a policy allowing employees to use personal cell phones and tablets to access
company email accounts while out of the office. Joe, an employee, was using a personal cell phone for email
access and was recently terminated. It is suspected that Joe saved confidential client emails on his personal
cell phone. Joe claims that the data on the phone is completely personal and refuse to allow the company
access to inspect the cell phone. Which of the following is the MOST likely cause of this dispute?
Which of the following is missing?
An administrator is having difficulty configuring WPA2 Enterprise using EAP-PEAP-MSCHAPv2. The
administrator has configured the wireless access points properly, and has configured policies on the RADIUS
server and configured settings on the client computers. Which of the following is missing?
Which of the following cipher suites should the adminis…
A security administrator would like the corporate webserver to select perfect forward secrecy ciphers first.
Which of the following cipher suites should the administrator select to accomplish this goal?
Which of the following is primarily used to provide fau…
Which of the following is primarily used to provide fault tolerance at the application level? (Choose two.)