Ann, the IT director, wants to ensure that as hoc chang…
Ann, the IT director, wants to ensure that as hoc changes are not making their way to the production
applications.
Which of the following principles is potentially being …
Joe uses his badge to enter the server room, Ann follows Joe entering without using her badge. It is later
discovered that Ann used a USB drive to remove confidential data from a server. Which of the following
principles is potentially being violated? (Choose two.)
Which of the following would achieve this?
A security technician wants to improve the strength of a weak key by making it more secure against brute force
attacks. Which of the following would achieve this?
Which of the following is the BEST solution?
A custom PKI application downloads a certificate revocation list (CRL) once per day. Management requests the
list be checked more frequently. Which of the following is the BEST solution?
Which of the following would provide the BEST environme…
Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety of servers
before deployment to the production environment while utilizing a limited amount of hardware resources.
Which of the following would provide the BEST environment for performing this testing?
When employing PKI to send signed and encrypted data th…
When employing PKI to send signed and encrypted data the individual sending the data must have: (Choose
two.)
Which of the following would meet this goal?
An administrator would like users to authenticate to the network using only UDP protocols. Which of the
following would meet this goal?
Which of the following would provide the MOST objective…
Which of the following would provide the MOST objective results when performing penetration testing for an
organization?
Which of the following stages of the Incident Handling …
A workstation is exhibiting symptoms of malware and the network security analyst has decided to remove the
system from the network.
Which of the following stages of the Incident Handling Response represents this?
Which of the following should be enabled in IPSec to al…
A security administrator wishes to protect session leys should a private key become discovered. Which of the
following should be enabled in IPSec to allow this?