Ann, the IT director, wants to ensure that as hoc changes are not making their way to the production
Joe uses his badge to enter the server room, Ann follows Joe entering without using her badge. It is later
discovered that Ann used a USB drive to remove confidential data from a server. Which of the following
principles is potentially being violated? (Choose two.)
A security technician wants to improve the strength of a weak key by making it more secure against brute force
attacks. Which of the following would achieve this?
A custom PKI application downloads a certificate revocation list (CRL) once per day. Management requests the
list be checked more frequently. Which of the following is the BEST solution?
Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety of servers
before deployment to the production environment while utilizing a limited amount of hardware resources.
Which of the following would provide the BEST environment for performing this testing?
When employing PKI to send signed and encrypted data the individual sending the data must have: (Choose
An administrator would like users to authenticate to the network using only UDP protocols. Which of the
following would meet this goal?
Which of the following would provide the MOST objective results when performing penetration testing for an
A workstation is exhibiting symptoms of malware and the network security analyst has decided to remove the
system from the network.
Which of the following stages of the Incident Handling Response represents this?
A security administrator wishes to protect session leys should a private key become discovered. Which of the
following should be enabled in IPSec to allow this?