Which of the following actions should be taken after th…
A vulnerability in the underlying SSL/TLS library used by a web server has been announced. The vulnerability allows an attacker to access the web server’s
memory. Which of the following actions should be taken after the vulnerability is patched? (Select TWO).
Which of the following should the security administrato…
A security administrator suspects that an employee has altered some fields within a noSQL database. Which of the following should the security administrator do to
confirm the suspicion and identify the employee?
Which of the following should the administrator now use…
An administrator learns that port 389 will soon be blocked by the internal firewall for security reasons. Which of the following should the administrator now use to
maintain compatibility with most applications?
Which of the following will use a configuration baselin…
A security administrator is implementing a new feature on the company extranet server to provide client access to track the status of products the company makes.
Which of the following will use a configuration baseline to reduce cross-site scripting and cross-site request forgery on the new feature?
Which of the following should the network administrator…
A plant security officer is continually losing connection to two IP cameras that monitor several critical high voltage motors. Which of the following should the network
administrator do to BEST ensure the availability of the IP camera connections?
Which of the following could BEST identify the administ…
A UNIX server recently had restricted directories deleted as the result of an insider threat. The root account was used to delete the directories while logged on at the
server console. There are five administrators that know the root password. Which of the following could BEST identify the administrator that removed the restricted
directories?
Which of the following can the administrator implement …
Two visitors connected their laptops to the wired internal network and immediately began consuming excessive amounts of bandwidth. Which of the following can
the administrator implement to mitigate these type of issues in the future?
Which of the following is important to reduce risk?
Which of the following is important to reduce risk?
Which of the following does this represent?
A database server has been compromised. A local user logged into the console and exploited a vulnerability caused by a missing operating system patch to get a
system level command shell. Which of the following does this represent?
Which of the following could be utilized to notify the …
Recently, the desktop support group has been performing a hardware refresh and has replaced numerous computers. An auditor discovered that a number of the
new computers did not have the company’s antivirus software installed on them. Which of the following could be utilized to notify the network support group when
computers without the antivirus software are added to the network?