Which of the following steps did the administrator perform?
A security Operations Center was scanning a subnet for infections and found a contaminated machine.
One of the administrators disabled the switch port that the machine was connected to, and informed a
local technician of the infection. Which of the following steps did the administrator perform?
Which of the following should the administrator deploy?
A security administrator wants to block unauthorized access to a web server using a locally installed
software program. Which of the following should the administrator deploy?
Which of the following is this known as?
A network administrator has identified port 21 being open and the lack of an IDS as a potential risk to the
company. Due to budget constraints, FTP is the only option that the company can is to transfer data and
network equipment cannot be purchased. Which of the following is this known as?
Which of the following logs should the administrator search for information regarding the breach?
A security administrator is investigating a recent server breach. The breach occurred as a result of a zeroday attack against a user program running on the server. Which of the following logs should the
administrator search for information regarding the breach?
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
A user attempts to install new and relatively unknown software recommended by a colleague. The user is
unable to install the program, despite having successfully installed other programs previously. Which of
the following is MOST likely the cause for the user’s inability to complete the installation?
Which of the following authentication services is being deployed by the administrator?
A system administrator is configuring shared secrets on servers and clients. Which of the following
authentication services is being deployed by the administrator? (Select two.)
Which of the following default ports on the firewall must the security engineer open to accomplish this task?
The finance department just procured a software application that needs to communicate back to the
vendor server via SSL. Which of the following default ports on the firewall must the security engineer
open to accomplish this task?
Which of the following did the organization fail to properly implement?
After an audit, it was discovered that an account was not disabled in a timely manner after an employee
has departed from the organization. Which of the following did the organization fail to properly
implement?
Which of the following BEST would protect the building from this threat?
The Chief Security Officer (CSO) for a datacenter in a hostile environment is concerned about protecting
the facility from car bomb attacks. Which of the following BEST would protect the building from this
threat? (Select two.)
Which of the following poses the greatest risk with this integration?
Users can authenticate to a company’s web applications using their credentials form a popular social
media site. Which of the following poses the greatest risk with this integration?