Which of the following should Ann recommend that would BEST address her concerns?
Ann, a security administrator, is strengthening the security controls of the company’s campus. Her goal is
to prevent people from accessing open locations that are not supervised, such as around the receiving
dock. She is also concerned that employees are using these entry points as a way of bypassing the
security guard at the main entrance. Which of the following should Ann recommend that would BEST
address her concerns?
Which of the following is MOST likely being used?
While an Internet café a malicious user is causing all surrounding wireless connected devices to have
intermittent and unstable connections to the access point. Which of the following is MOST likely being
used?
Which of the following is the BEST technical control that could be implemented to reduce the amount of easily
A password audit has revealed that a significant percentage if end-users have passwords that are easily
cracked. Which of the following is the BEST technical control that could be implemented to reduce the
amount of easily “crackable” passwords in use?
Which of the following is the MOST secure combination to implement to meet this goal?
While working on a new project a security administrator wants to verify the integrity of the data in the
organizations archive library. Which of the following is the MOST secure combination to implement to
meet this goal? (Select TWO)
Which of the following should be performed after the server has been restored?
A company has been attacked and their website has been altered to display false information. The
security administrator disables the web server service before restoring the website from backup. An audit
was performed on the server and no other data was altered. Which of the following should be performed
after the server has been restored?
Which of the following tools could BEST be used to determine how the employee is connecting to the reverse pro
A security administrator suspects that an employee in the IT department is utilizing a reverse proxy to
bypass the company’s content filter and browse unapproved and non-work related sites while at work.
Which of the following tools could BEST be used to determine how the employee is connecting to the
reverse proxy?
Which of the following protocols should he secure?
Joe, a company’s network engineer, is concerned that protocols operating at the application layer of the
OSI model are vulnerable to exploitation on the network. Which of the following protocols should he
secure?
Which of the following is preventing the users from accessing the SSH server?
Ann a security technician receives a report from a user that is unable to access an offsite SSN server. Ann
checks the firewall and sees the following rules:
Allow TCP 80
Allow TCP 443
Deny TCP 23
Deny TCP 20
Deny TCP 21
Which of the following is preventing the users from accessing the SSH server?
Which of the following control methods is the administrator using by configuring this policy?
An administrator uses a server with a trusted OS and is configuring an application to go into production
tomorrow, In order to make a new application work properly, the administrator creates a new policy that
labels the application and assigns it a security context within the trusted OS. Which of the following
control methods is the administrator using by configuring this policy?
what should be done?
A security administrator has been tasked with assisting in the forensic investigation of an incident relating
to employee misconduct. The employee’s supervisor believes evidence of this misconduct can be found
on the employee’s assigned workstation. Which of the following choices BEST describes what should be
done? (Select TWO)