Which of the following would eliminate Ann’s excuse in …
Several customers received an email from an employee that advertised better rates at a different company. Shortly after the email was sent, Ann, the employee
who sent the email, resigned and joined the other company. When confronted, Ann claimed that she did not send the email, it was another person spoofing her
email address. Which of the following would eliminate Ann’s excuse in the future?
Which of the following BEST identifies the stage of inc…
A company was recently the victim of a major attack which resulted in significant reputational loss. Joe a member of the company incident response team is
currently reviewing Standard Operating Procedures for the team in the wake of the attack. Which of the following BEST identifies the stage of incident response that
Joe is in?
Which of the following would be the MOST efficient meth…
A systems administrator is working with a third party to establish the automated transfer of large amounts of proprietary data. The interface will need to use secured
credentials and the transmission will consist of data that has been encrypted prior to transit and needs no additional protection. Which of the following would be the
MOST efficient method of data transmission given the established requirements?
Which of the following would be the BEST control to imp…
A company wants to be made aware of anyone who enters onto their property. Which of the following would be the BEST control to implement?
Which of the following can the employee perform if the …
A company has hired a an ex-employee to perform a penetration test of the company’s proprietary application. Although the ex-employee used to be part of the
development team, the application has gone through some changes since the employee left. Which of the following can the employee perform if the company is not
willing to release any information to the ex-employee?
Which of the following can be used to standardize and e…
During a recent vulnerability assessment the penetration testers were able to successfully crack a large number of employee passwords. The company technology
use agreement clearly states that passwords used on the company network must be at least eight characters long and contain at least one uppercase letter and
special character. Which of the following can be used to standardize and enforce the password complexity rules across the entire organization to resolve the issue?
The auditor performs a test on the network, resulting i…
A security auditor has full knowledge of company configuration and equipment. The auditor performs a test on the network, resulting in an exploitation of a zero-day
vulnerability.
Which of the following actions is appropriate for the website administrator to…
A high traffic website is experiencing numerous brute force attacks against its user base. The attackers are using a very large botnet to carry out the attack. As a
result, many users passwords are being compromised Which of the following actions is appropriate for the website administrator to take in order to reduce the
threat from this type of attack in the future. .
Which of the following are valid token password schemes…
A security administrator is responsible for deployment of a new two factor authentication solution. The administrator has been informed that the solution will use soft
tokens. Which of the following are valid token password schemes for the two factor solution being deployed? (Select TWO)
Which of the following commands can be used to see proc…
When responding to an incident on a new Windows server, the administrator needs to disable unused services. Which of the following commands can be used to
see processes that are listening on a TCP port?