Which of the following access control methodologies pro…
Which of the following access control methodologies provides an individual with the most restrictive access rights to successfully perform their authorized duties?
Which of the following data transport?
An administrator requests a new VLAN be created to support the installation of a new SAN. Which of the following data transport?
Which of the following settings must be configured?
A system administrator must configure the company’s authentication system to ensure that users will be unable to reuse the last ten passwords within a six months
period. Which of the following settings must be configured? (Select Two)
Which of the following commands can be used to see proc…
While responding to an incident on a new Windows server, the administrator needs to disable unused services. Which of the following commands can be used to
see processes that are listening on a TCP port?
Which of the following is a proprietary protocol common…
Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
Virtualization that allows an operating system kernel t…
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is called:
Which of the following job roles should receive trainin…
A security manager is preparing the training portion of an incident plan. Which of the following job roles should receive training on forensics, chain of custody, and
the order of volatility?
Which of the following attacks may be occurring?
After disabling SSID broadcast, a network administrator still sees the wireless network listed in available networks on a client laptop. Which of the following attacks
may be occurring?
Which of the following would have prevented the network…
A network was down for several hours due to a contractor entering the premises and plugging both ends of a network cable into adjacent network jacks. Which of
the following would have prevented the network outage? (Select Two)
This is an example of:
During a code review a software developer discovers a security risk that may result in hundreds of hours of rework. The security team has classified these issues as
low risk. Executive management has decided that the code will not be rewritten. This is an example of: