which of the following reasons should administrator tak…
A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject Alternative
Names (SAN) attribute of a certificate?
which of the following should be taken into considerati…
New magnetic locks were ordered for an entire building. In accordance with company policy, employee safety is the top priority. In case of a fire where electricity is
cut, which of the following should be taken into consideration when installing the new locks?
Which of the following BEST describes this type of IDS?
A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list. Which of the following BEST describes
this type of IDS?
Which of the following is the proper way to quantify th…
Which of the following is the proper way to quantify the total monetary damage resulting from an exploited vulnerability?
An annual audit of the business partner is conducted ag…
A company exchanges information with a business partner. An annual audit of the business partner is conducted against the SLA in order to verify:
Which of the following should have been performed to en…
After a merger, it was determined that several individuals could perform the tasks of a network administrator in the merged organization. Which of the following
should have been performed to ensure that employees have proper access?
which of the following?
During an application design, the development team specifics a LDAP module for single sign-on communication with the company’s access control database. This
is an example of which of the following?
Which of the following should be used to implement voic…
Which of the following should be used to implement voice encryption?
Which of the following would further obscure the presen…
The SSID broadcast for a wireless router has been disabled but a network administrator notices that unauthorized users are accessing the wireless network. The
administrator has determined that attackers are still able to detect the presence of the wireless network despite the fact the SSID has been disabled. Which of the
following would further obscure the presence of the wireless network?
Which of the following is the strongest collision resis…
An administrator is testing the collision resistance of different hashing algorithms. Which of the following is the strongest collision resistance test?