Which of the following algorithms should the administra…
An administrator would like to utilize encryption that has comparable speed and strength to the AES cipher
without using AES itself. The cipher should be able to operate in the same modes as AES and utilize the same
minimum bit strength. Which of the following algorithms should the administrator select?
Which of the following password parameters is MOST like…
Company policy requires employees to change their passwords every 60 days. The security manager has
verified all systems are configured to expire passwords after 60 days. Despite the policy and technical
configuration, weekly password audits suggest that some employees have had the same weak passwords in
place longer than 60 days. Which of the following password parameters is MOST likely misconfigured?
Which of the following security controls would be MOST …
A company wants to prevent unauthorized access to its secure data center. Which of the following security
controls would be MOST appropriate?
Which of the following techniques is MOST likely to gat…
A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7Which of the following techniques is MOST likely to gather this type of data?
Which of the following is an attack designed to activat…
Which of the following is an attack designed to activate based on date?
Which of the following can BEST reduce the likelihood o…
A webpage displays a potentially offensive advertisement on a computer. A customer walking by notices the
displayed advertisement and files complaint. Which of the following can BEST reduce the likelihood of this
incident occurring again?
Which of the following services could be run on the VPN…
A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a
backend directory service. Which of the following services could be run on the VPN concentrator to perform this
authentication?
Searching for systems infected with malware is consider…
Searching for systems infected with malware is considered to be the following phases of incident response:
Which of the following is the GREATEST security concern…
Which of the following is the GREATEST security concern of allowing employees to bring in their personally
owned tablets and connecting to the corporate network?
Which of the following technologies provide the MOST co…
A security engineer is tasked with encrypting corporate email. Which of the following technologies provide the
MOST complete protection? (Choose two.)