Which of the following if implemented would violate com…
A company’s password and authentication policies prohibit the use of shared passwords and transitive trust.
Which of the following if implemented would violate company policy? (Choose two.)
Which of the following should be the PRIMARY security c…
Two organizations want to share sensitive data with one another from their IT systems to support a mutual
customer base. Both organizations currently have secure network and security policies and procedures. Which
of the following should be the PRIMARY security considerations by the security managers at each organization
prior to sharing information? (Choose three.)
Which of the following would BEST assist in correcting …
The help desk is experiencing a higher than normal amount of calls from users reporting slow response from
the application server. After analyzing the data from a packet capturing tool, the head of the network
engineering department determines that the issue is due, in part from the increase of personnel recently hired
to perform application development. Which of the following would BEST assist in correcting this issue?
Which of the following IP address/subnet mask combinati…
A network technician is configuring clients for VLAN access. The network address for the sales department is
192.168.0.64 with a broadcast address of 192.168.0.71. Which of the following IP address/subnet mask
combinations could be used to correctly configure a client machine in the sales department?
Which of the following does this demonstrate?
A security manager installed a standalone fingerprint reader at the data center. All employees that need to
access the data center have been enrolled to the reader and local reader database is always kept updates.
When an employee who has been enrolled uses the fingerprint reader the door to the data center opens. Which
of the following does this demonstrate? (Choose three.)
which of the following technologies in the MOST critica…
In an environment where availability is critical such as Industrial control and SCADA networks, which of the
following technologies in the MOST critical layer of defense for such systems?
Which of the following could she implement to add an ad…
Ann a network administrator has been tasked with strengthening the authentication of users logging into
systems in area containing sensitive information. Users log in with usernames and passwords, following by a
retinal scan. Which of the following could she implement to add an additional factor of authorization?
Which of the following should be configured on the netw…
The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to work
and plug them directly into the network port under their desk. Which of the following should be configured on
the network switch to prevent this from happening?
Which of the following could help reduce the likelihood…
A resent OS patch caused an extended outage. It took the IT department several hours to uncover the cause of
the issue due to the system owner who installed the patch being out of the office. Which of the following could
help reduce the likelihood of this situation occurring in the future?
Which of the following attacks does this describes?
A server administrator notes that a fully patched application often stops running due to a memory error. When
reviewing the debugging logs, they notice code being run calling an internal process to exploit the machine.
Which of the following attacks does this describes?