which account is responsible for setting the security policy for an organization?
In intrusion detection system vernacular, which account is responsible for setting the security policy for
an organization?
Which of the following is the type of vulnerability described?
When performing the daily review of the system vulnerability scans of the network Joe, the administrator,
noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe
researches the assigned vulnerability identification number from the vendor website. Joe proceeds with
applying the recommended solution for identified vulnerability.Which of the following is the type of vulnerability described?
Which of the following types of IDS has been deployed?
has concerns that the device is only able to detect known anomalies. Which of the following types of IDS
has been deployed?
Which of the following types of technologies will BEST address this scenario?
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is capable of
alerting the team when unusual traffic is on the network. Which of the following types of technologies
will BEST address this scenario?
Which of the following utilities was he MOST likely using to view this issue?
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server.
After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in
sequence again. Which of the following utilities was he MOST likely using to view this issue?
Which the following flags are used to establish a TCP connection?
Which the following flags are used to establish a TCP connection? (Select TWO).
Which of the following components of an all-in-one security appliance would MOST likely be configured in order
Which of the following components of an all-in-one security appliance would MOST likely be configured in
order to restrict access to peer-to-peer file sharing websites?
Which of the following devices would BEST achieve this goal?
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web
sites. Which of the following devices would BEST achieve this goal?
Which of the following might the administrator need to configure?
The administrator receives a call from an employee named Joe. Joe says the Internet is down and he is
receiving a blank page when typing to connect to a popular sports website. The administrator asks Joe to
try visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to
the sports site on this phone. Which of the following might the administrator need to configure?
Layer 7 devices used to prevent specific types of html tags are called:
Layer 7 devices used to prevent specific types of html tags are called: