Which of the following are the MOST likely causes of this issue?
The loss prevention department has purchased a new application that allows the employees to monitor
the alarm systems at remote locations. However, the application fails to connect to the vendor’s server
and the users are unable to log in. Which of the following are the MOST likely causes of this issue? (Select
TWO).
which of the following is the MOST important security concern Ann should be aware of?
Ann is an employee in the accounting department and would like to work on files from her home
computer. She recently heard about a new personal cloud storage service with an easy web interface.Before uploading her work related files into the cloud for access, which of the following is the MOST
important security concern Ann should be aware of?
Which of the following ports should be selected to establish a successful connection?
An active directory setting restricts querying to only secure connections. Which of the following ports
should be selected to establish a successful connection?
which of the following ports?
Signed digital certificates used to secure communication with a web server are MOST commonly
associated with which of the following ports?
Which of the following network segmentation schemas would BEST meet this objective?
An organization has three divisions: Accounting, Sales, and Human Resources. Users in the Accounting
division require access to a server in the Sales division, but no users in the Human Resources division
should have access to resources in any other division, nor should any users in the Sales division have
access to resources in the Accounting division. Which of the following network segmentation schemas
would BEST meet this objective?
Which of the following would be the BEST course of action for the consultant to recommend?
A retail store uses a wireless network for its employees to access inventory from anywhere in the store.
Due to concerns regarding the aging wireless network, the store manager has brought in a consultant toharden the network. During the site survey, the consultant discovers that the network was using WEP
encryption. Which of the following would be the BEST course of action for the consultant to recommend?
Which of the following MUST happen before the server can communicate on VLAN 12?
A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication works fine,
but VLAN 12 does not. Which of the following MUST happen before the server can communicate on VLAN
12?
Three of the primary security control types that can be implemented are.
Three of the primary security control types that can be implemented are.
which applications a user can install and run on a company issued mobile device?
Which of the following technical controls is BEST used to define which applications a user can install and
run on a company issued mobile device?
Which of the following controls is being described in this situation?
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock
the PC after five minutes of inactivity. Which of the following controls is being described in this situation?
