Which of the following would resolve the issue?
During a review a company was cited for allowing requestors to approve and implement their own
change request. Which of the following would resolve the issue? (Select TWO)
Which of the following should be enabled in IPSec to allow this?
A security administrator wishes to protect session leys should a private key become discovered. Which of
the following should be enabled in IPSec to allow this?
which of the following stages of the Incident Handling Response?
A workstation is exhibiting symptoms of malware and the network security analyst has decided to remove
the system from the network. This represents which of the following stages of the Incident Handling
Response?
Which of the following would provide the MOST objective results when performing penetration testing for an org
Which of the following would provide the MOST objective results when performing penetration testing
for an organization?
Which of the following would meet this goal?
An administrator would like users to authenticate to the network using only UDP protocols. Which of the
following would meet this goal?
When employing PKI to send signed and encrypted data the individual sending the data must have: (Select TWO)
When employing PKI to send signed and encrypted data the individual sending the data must have:
(Select TWO)
Which of the following would provide the BEST environment for performing this testing?
Joe a technician is tasked with finding a way to test operating system patches for a wide variety of servers
before deployment to the production environment while utilizing a limited amount of hardware
resources. Which of the following would provide the BEST environment for performing this testing?
Which of the following is the BEST solution?
A custom PKI application downloads a certificate revocation list (CRL) once per day. Management
requests the list be checked more frequently. Which of the following is the BEST solution?
Which of the following would achieve this?
A security technician wants to improve the strength of a weak key by making it more secure against brute
force attacks. Which of the following would achieve this?
Which of the following principles is potentially being violated?
Joe uses his badge to enter the server room, Ann follows Joe entering without using her badge. It is later
discovered that Ann used a USB drive to remove confidential data from a server. Which of the following
principles is potentially being violated? (Select TWO)