Which of the following could BEST prevent a situation l…
A video surveillance audit recently uncovered that an employee plugged in a personal laptop and used the
corporate network to browse inappropriate and potentially malicious websites after office hours. Which of the
following could BEST prevent a situation like this form occurring again?
Joe filters client-side JAVA input.
Joe, an application developer, is building an external facing marketing site. There is an area on the page where
clients may submit their feedback to articles that are posted. Joe filters client-side JAVA input.
Which of the following should be used?
An agent wants to create fast and efficient cryptographic keys to use with Diffie-Hellman without using prime
numbers to generate the keys. Which of the following should be used?
Which of the following would accomplish this requirement?
An organization is required to log all user internet activity. Which of the following would accomplish this
requirement?
which of the following attacks?
Attempting to inject 50 alphanumeric key strokes including spaces into an application input field that only
expects four alpha characters in considered which of the following attacks?
Which of the following could have prevented this situat…
Various employees have lost valuable customer data due to hard drives failing in company provided laptops. It
has been discovered that the hard drives used in one model of laptops provided by the company has been
recalled by the manufactory. The help desk is only able to replace the hard drives after they fail because there
is no centralized record of the model of laptop given to each specific user. Which of the following could have
prevented this situation from occurring?
Which of the following should the administrator do?
One of the findings of risk assessment is that many of the servers on the data center subnet contain data that is
in scope for PCI compliance, Everyone in the company has access to these servers, regardless of their job
function. Which of the following should the administrator do?
Which of the following would be a reason for developers…
Which of the following would be a reason for developers to utilize an AES cipher in CCM mode (Counter with
Chain Block Message Authentication Code)?
Which of the following would BEST address this concern?
An administrator has concerns regarding the company’s server rooms. Proximity badge readers were installed,
but it is discovered this is not preventing unapproved personnel from tailgating into these areas.
Which of the following would BEST address this concern?
Which of the following would an attacker use to generat…
Which of the following would an attacker use to generate and capture additional traffic prior to performing an IV
attack?