PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following will BEST meet the goals of law …

A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal.
However, they would like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested
that the user’s ongoing communication be retained in the user’s account for future investigations. Which of the following will BEST meet the goals of law

enforcement?

The security administrator instead suggests that the de…

A recently hired security administrator is advising developers about the secure integration of a legacy in-house application with a new cloud based processing
system. The systems must exchange large amounts of fixed format data such as names, addresses, and phone numbers, as well as occasional chunks of data in
unpredictable formats. The developers want to construct a new data format and create custom tools to parse and process the data. The security administrator
instead suggests that the developers:

Which of the following recommendations would BEST meet …

A security administrator has been asked to select a cryptographic algorithm to meet the criteria of a new application. The application utilizes streaming video that
can be viewed both on computers and mobile devices. The application designers have asked that the algorithm support the transport encryption with the lowest
possible performance overhead. Which of the following recommendations would BEST meet the needs of the application designers? (Select TWO).

Which of the following should Ann perform to test wheth…

Ann is testing the robustness of a marketing website through an intercepting proxy. She has intercepted the following HTTP request:
POST /login.aspx HTTP/1.1

Host: comptia.org
Content-type: text/html
txtUsername=ann&txtPassword=ann&alreadyLoggedIn=false&submit=true
Which of the following should Ann perform to test whether the website is susceptible to a simple authentication bypass?


Page 453 of 4,924« First...102030...451452453454455...460470480...Last »