Which of the following is Joe trying to achieve?
Joe wants to employ MD5 hashing on the company file server. Which of the following is Joe trying to
achieve?
Which of the following choices BEST mitigates the security risk of public web surfing?
By hijacking unencrypted cookies an application allows an attacker to take over existing web sessions that
do not use SSL or end to end encryption. Which of the following choices BEST mitigates the security risk
of public web surfing? (Select TWO)
Which of the following encryptions needs BOTH of these needs?
The security administration team at a company has been tasked with implementing a data-at-rest
solution for its company storage. Due to the large amount of storage the Chief Information Officer (CISO)
decides that a 128-bit cipher is needed but the CISO also does not want to degrade system performance
any more than necessary. Which of the following encryptions needs BOTH of these needs?
which of the following poses the greatest security issues?
A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation,
which of the following poses the greatest security issues?
Which of the following is the primary focus?
After several thefts a Chief Executive Officer (CEO) wants to ensure unauthorized do not have to
corporate grounds or its employees. The CEO just approved new budget line items for fences, lighting,
locks and CCTVs. Which of the following is the primary focus?
Which of the following steps in incident response procedures entails of the incident and identification of kno
Which of the following steps in incident response procedures entails of the incident and identification of
knowledge gained that can be applied to future handling of incidents?
Which of the following automated or semi-automated software testing techniques relies on inputting large amoun
Which of the following automated or semi-automated software testing techniques relies on inputting
large amounts of random data to detect coding errors or application loopholes?
Which of the following concerns will MOST affect the decision to use a personal device to receive company emai
A company’s BYOD policy requires the installation of a company provide mobile agent on their on their
personally owned devices which would allow auditing when an employee wants to connect a device tothe corporate email system. Which of the following concerns will MOST affect the decision to use a
personal device to receive company email?
Which of the following reasons would explain why this attack could be successful?
A penetration tester is measuring a company’s posture on social engineering. The penetration tester
sends a phishing email claiming to be from IT asking employees to click a link to update their VPN
software immediately. Which of the following reasons would explain why this attack could be successful?
Which of the following is the MOST likely issue?
The employee can access other network resources and the Internet. Other accounting employees are
able to access the accounting server without any issues. Which of the following is the MOST likely issue?