Which of the following is MOST likely configured improperly?
The border firewall rules were recently modified by a network administrator to allow access to a new service on Server 1 using the default https port. When testing
the new rules internal to the company network there are no issues and when testing from an external connection it does not work. The host running the service
does not receive external packets. Other services hosted on Server 1 are responding fine to to both internal and external connection attempts. Which of the
following is MOST likely configured improperly?
Which of the following methods can the analyst use to s…
A security analyst at a nuclear power plant needs to secure network traffic from the legacy SCADA systems. Which of the following methods can the analyst use to
secure network in this static environment?
Which of the following MOST likely occurred?
An employee has been terminated due to inappropriate Internet use. A computer forensics technician at the organization acquired an image of the hard drive and
hashed it using MD5. The former employee has filed a lawsuit. The former employee’s attorney requests a copy of the image so it can be independently reviewed
by the legal team. Upon receiving the image, the attorney’s technician also generates a MD5 hash of the image and comes up with a different output than what was
provided. Which of the following MOST likely occurred?
Which of the following explains why the administrator w…
A network administrator for a small business is configuring a wireless network for 20 users. Which of the following explains why the administrator would choose
WPA2 Personal over WPA Enterprise?
Which of the following mitigations would be MOST approp…
A server administrator is investigating a breach and determines that an attacker modified the application log to obfuscate the attack vector. During the lessons
learned activity the facilitator asks for a mitigation response to protect the integrity of the logs should a similar attack occur. Which of the following mitigations would
be MOST appropriate to fulfill the requirement?
Which of the following can be performed instead of comp…
A company has completed a continuity of operations plan and needs to validate that everyone knows what actions to perform. Which of the following can be
performed instead of completing a full fail over to validate the requirement?
which of the following best security practices and avoi…
Joe has been in the same IT position for the last 27 years and has developed a lot of homegrown applications that the company utilizes. The company is concerned
that Joe is the only one who can administer these applications. The company should enforce which of the following best security practices and avoid Joe being a
single point of failure?
Which of the following would BEST prevent unauthorized …
The Chief Security Officer (CSO) is concerned with unauthorized access at the company’s off-site datacenter. The CSO would like to enhance the security posture
of the datacenter. Which of the following would BEST prevent unauthorized individuals from gaining access to the datacenter?
Which of the following is MOST effective at cracking ha…
Which of the following is MOST effective at cracking hashed passwords?
Which of the following encryption solutions would meet …
An enterprise needs to be able to receive files that contain PII from many customers at different times. The data must remain encrypted during transport and while
at rest. Which of the following encryption solutions would meet both of these requirements?