Which of the following should be used to allow fir prop…
The network manager has obtained a public IP address for use with a new system to be available via the
internet. This system will be placed in the DMZ and will communicate with a database server on the LAN.
Which of the following should be used to allow fir proper communication between internet users and the internal
systems?
Which of the following should the user do to enforce fu…
A user has an Android smartphone that supports full device encryption. However, when the user plugs into a
computer all of the files are immediately accessible.
Which of the following should the user do to enforce full device confidentiality should the phone be lost or
stolen?
Which of the following can be used to do this without u…
Ann, a security administrator, wants to limit access to the wireless network. Which of the following can be used
to do this without using certificates?
which of the following solutions would work BEST?
A military base wants to incorporate biometrics into its new security measures, but the head of security does not
want them to be the sole method of authentication. For unmanned entry points, which of the following solutions
would work BEST?
which of the following should the sender use to digital…
When implementing a Public Key Infrastructure, which of the following should the sender use to digitally sign a
document?
which of the following would be MOST appropriate for fa…
For high availability which of the following would be MOST appropriate for fault tolerance?
which of the following scenarios would it be preferable…
In which of the following scenarios would it be preferable to implement file level encryption instead of whole disk
encryption?
This is known as a:
When an authorized application is installed on a server, the application triggers an alert on the HIDS. This is
known as a:
Which of the following will alert the security team whe…
A review of administrative access has discovered that too many accounts have been granted administrative
rights. Which of the following will alert the security team when elevated access is applied?
Which of the following is used to inform users of the r…
Which of the following is used to inform users of the repercussions of releasing proprietary information?