Which of the following choices BEST meets her intent of…
Ann a new small business owner decides to implement WiFi access for her customers. There are several other
businesses nearby who also have WiFi hot spots. Ann is concerned about security of the wireless network and
wants to ensure that only her customers have access. Which of the following choices BEST meets her intent of
security and access?
Which of the following exploits either a host file on a…
Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS server in order
to carry out URL redirection?
which of the following should be implemented?
A cyber security administrator receives a list of IPs that have been reported as attempting to access the
network. To identify any possible successful attempts across the enterprise, which of the following should be
implemented?
Which of the following security controls will BEST achi…
A company recently received accreditation for a secure network, In the accreditation letter, the auditor specifies
that the company must keep its security plan current with changes in the network and evolve the systems to
adapt to new threats. Which of the following security controls will BEST achieve this goal?
Which of the following types of attacks may be underway?
An employee from the fire Marshall’s office arrives to inspect the data center. The operator allows him to
bypass the multi-factor authentication to enter the data center. Which of the following types of attacks may be
underway?
Which of the following appropriately categorizes the au…
A user Ann has her assigned token but she forgotten her password. Which of the following appropriately
categorizes the authentication factor that will fail in this scenario?
Which of the following is the team performing?
The Quality Assurance team is testing a third party application. They are primarily testing for defects and have
some understanding of how the application works. Which of the following is the team performing?
Which of the following is this an example of?
After connecting to the corporate network a user types the URL if a popular social media website in the browser
but reports being redirected to a login page with the corporate logo. Which of the following is this an example
of?
Which of the following types of malware is this?
A rogue programmer included a piece of code in an application to cause the program to halt at 2:00 PM on
Monday afternoon when the application is most utilized.
Which of the following types of malware is this?
Which of the following ports should be opened on the fi…
A security technician has been tasked with opening ports on a firewall to allow users to browse the Internet.
Which of the following ports should be opened on the firewall? (Choose Three)