Which of the following incident response plan steps wou…
Which of the following incident response plan steps would MOST likely engaging business professionals with
the security team to discuss changes to existing procedures?
Which of the following types of training would be the M…
Users in the HR department were recently informed that they need to implement a user training and awareness
program which is tailored to their department. Which of the following types of training would be the MOST
appropriate for this department?
Which of the following documents outlines the responsib…
Which of the following documents outlines the responsibility of both participants in an agreement between two
organizations?
Which of the following should the engineer do to harden…
A network security engineer notices unusual traffic on the network from a single IP attempting to access
systems on port 23. Port 23 is not used anywhere on the network. Which of the following should the engineer
do to harden the network from this type of intrusion in the future?
Which of the following is an attack designed to activat…
Which of the following is an attack designed to activate based on time?
Which of the following metrics is MOST important is thi…
The database server used by the payroll system crashed at 3 PM and payroll is due at 5 PM. Which of the
following metrics is MOST important is this instance?
Which of the following types of cloud computing would b…
Which of the following types of cloud computing would be MOST appropriate if an organization required
complete control of the environment?
Which of the following protocols should be used for key…
A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which
of the following protocols should be used for key exchange?
Which of the following authentication technique is MOST…
The ore-sales engineering team needs to quickly provide accurate and up-to-date information to potential
clients. This information includes design specifications and engineering data that is developed and stored using
numerous applications across the enterprise. Which of the following authentication technique is MOST
appropriate?
Which of the following would be the BEST control to imp…
A company wants to prevent end users from plugging unapproved smartphones into PCs and transferring data.
Which of the following would be the BEST control to implement?