Which of the following would need to be configured on e…
A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of
the following would need to be configured on each network device to provide that information in a secure manner?
Which of the following techniques describes the use of …
Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised?
Which of the following would be the result of a user ph…
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as
the default setting?
Which of the following describes the environment the ad…
An administrator is building a development environment and requests that three virtual servers are cloned and placed in a new virtual network isolated from the
production network. Which of the following describes the environment the administrator is building?
Which of the following actions should the IT security t…
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions
should the IT security team implement to help protect the network from attack as a result of this new policy?
Which of the following should the administrator use to …
A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to
customer PCs.
Which of the following should the administrator use to test the patching process quickly and often?
Which of the following standards should be consulted?
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. Which of the following standards should be
consulted?
Which of the following solutions provides the most flex…
Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?
Which of the following is the BEST explanation that des…
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST
explanation that describes this scenario?
Which of the following security techniques is MOST appr…
The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security
posture. Which of the following security techniques is MOST appropriate to do this?
