Which of the following is MOST likely to have prevented…
A company’s security analyst is investigating the suspected compromise of the company’s intranet web server. The compromise occurred at a time when no users
were logged into the domain. Which of the following is MOST likely to have prevented the attack from a new machine introduced to the corporate network?
Which of the following is the primary reason why such a…
Upper management wishes to implement a policy forbidding the use of personal devices on the corporate network. Which of the following is the primary reason why
such a policy would be put in place?
Which of the following actions should the administrator…
The security administrator for a growing company is concerned about the increasing prevalence of personal devices connected to the corporate WLAN. Which of
the following actions should the administrator take FIRST to address this concern?
Which of the following MOST likely explains this occurrence?
A security engineer is monitoring suspicious traffic from an internal endpoint to a malicious landing page of an external entity. The internal endpoint is configured
using a limited account, is fully patched to current standards, and has current antivirus signatures. No alerts have been received involving this endpoint. The
security engineer finds malicious code on the endpoint during a forensic analysis. Which of the following MOST likely explains this occurrence?
Which of the following could the security administrator…
A company uses PKI certificates stored on a smart chip enabled badge. The badge is used for a small number of devices that connect to a wireless network. A user
reported that their badge was stolen. Which of the following could the security administrator implement to prevent the stolen badge from being used to compromise
the wireless network?
Which of the following should be used to meet requirement?
A company is implementing a system to transfer direct deposit to a financial institution. One of the requirements is that the institution must be certain that the
deposit amounts within the file have not been charged. Which of the following should be used to meet requirement?
Which of the following should be used to fulfill this r…
An application developer has coded a new application and needs to test all input fields. Which of the following should be used to fulfill this requirement?
Which of the following has been performed against the d…
A security analyst has been asked to perform penetration testing against a web application being deployed for the first time. When performing the test the
application stops responding and returns an error referring to failed database connections. Upon further investigation, the analyst finds the database server was
inundated with commits which exhausted available space on the volume. Which of the following has been performed against the database server?
Which of the following allows an application to securel…
Which of the following allows an application to securely authenticate a user by receiving credentials from a remote web domain?
Which of the following security methods should Ann sugg…
Ann is preparing a presentation for management to highlight some of the issues the security department is facing trying to integrate the organizations BYOD policy.
Highest of her list is the transparency of network resources. The DAC environment includes several departments including payroll, HR, IT, and Management.
However, the small company’s structure has never been updated to incorporate these departments. The organization continued to add users based on the same
original general user profile. Which of the following security methods should Ann suggest to management to BEST fix this issue?