Joe, a web developer, wants to make sure his application is not susceptible to cross-site request forgery
attacks. Which of the following is one way to prevent this type of attack?
A security administrator has been tasked with assisting in the forensic investigation of an incident relating to
employee misconduct. The employee’s supervisor believes evidence of this misconduct can be found on the
employee’s assigned workstation. Which of the following choices BEST describes what should be done?
An administrator uses a server with a trusted OS and is configuring an application to go into production
tomorrow, In order to make a new application work properly, the administrator creates a new policy that labels
the application and assigns it a security context within the trusted OS. Which of the following control methods is
the administrator using by configuring this policy?
Ann a security technician receives a report from a user that is unable to access an offsite SSN server. Ann
checks the firewall and sees the following rules:
Allow TCP 80
Allow TCP 443
Deny TCP 23
Deny TCP 20
Deny TCP 21
Which of the following is preventing the users from accessing the SSH server?
Joe, a company’s network engineer, is concerned that protocols operating at the application layer of the OSI
model are vulnerable to exploitation on the network. Which of the following protocols should he secure?
A security administrator suspects that an employee in the IT department is utilizing a reverse proxy to bypass
the company’s content filter and browse unapproved and non-work related sites while at work. Which of the
following tools could BEST be used to determine how the employee is connecting to the reverse proxy?
A company has been attacked and their website has been altered to display false information. The security
administrator disables the web server service before restoring the website from backup. An audit was
performed on the server and no other data was altered. Which of the following should be performed after the
server has been restored?
While working on a new project a security administrator wants to verify the integrity of the data in the
organizations archive library. Which of the following is the MOST secure combination to implement to meet this
goal? (Choose two.)
A password audit has revealed that a significant percentage if end-users have passwords that are easily
cracked. Which of the following is the BEST technical control that could be implemented to reduce the amount
of easily “crackable” passwords in use?
While an Internet café a malicious user is causing all surrounding wireless connected devices to have
intermittent and unstable connections to the access point. Which of the following is MOST likely being used?