A network security administrator is trying to determine how an attacker gained access to the corporate wireless
network. The network is configured with SSID broadcast disabled. The senior network administrator explains
that this configuration setting would only have deterred an unsophisticated attacker because of the following:
A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site do not
record any footage. Which of the following types of controls was being used?
Data confidentiality must be enforced on a secure database.
Which of the following controls meets this goal? (Choose two.)
A security technician has removed the sample configuration files from a database server. Which of the
following application security controls has the technician attempted?
Ann, a member of the Sales Department, has been issued a company-owned laptop for use when traveling to
Which of the following would be MOST appropriate when configuring security on her laptop?
A Windows- based computer is infected with malware and is running too slowly to boot and run a malware
scanner. Which of the following is the BEST way to run the malware scanner?
When confidentiality is the primary concern, which of the following types of encryption should be chosen?
Which of the following ports is used for TELNET by default?
Which of the following is BEST described by a scenario where management chooses not to implement a
security control for a given risk?
Which of the following would allow users from outside of an organization to have access to internal resources?