Which of the following or techniques does this indicate?
Which of the following should the company implement?
A company discovers an unauthorized device accessing network resources through one of many network
drops in a common area used by visitors. The company decides that is wants to quickly prevent
unauthorized devices from accessing the network but policy prevents the company from making changes
on every connecting client. Which of the following should the company implement?
Which of the following is the consequence of this reported problem?
The helpdesk is receiving numerous reports that a newly installed biometric reader at the entrance of the
data center has a high of false negatives. Which of the following is the consequence of this reported
problem?
Which of the following policies is MOST likely being violated?
A software developer places a copy of the source code for a sensitive internal application on a company
laptop to work remotely. Which of the following policies is MOST likely being violated?
Which of the following addresses refer to localhost?
While testing a new host based firewall configuration a security administrator inadvertently blocks access
to localhost which causes problems with applications running on the host. Which of the following
addresses refer to localhost?
Which of the following potential incident types is this?
A user has reported inadvertently sending an encrypted email containing PII to an incorrect distribution
group. Which of the following potential incident types is this?
Which of the following would be the MOST common security concern in this scenario?
A company is exploring the option of letting employees use their personal laptops on the internal
network. Which of the following would be the MOST common security concern in this scenario?
Which of the following should be the engineer’s FIRST step in troubleshooting the issues?
A security engineer discovers that during certain times of day, the corporate wireless network is dropping
enough packets to significantly degrade service. Which of the following should be the engineer’s FIRST
step in troubleshooting the issues?
which of the following will prevent this type of attack on the web server?
A security administrator is reviewing the web logs and notices multiple attempts by users to access:
http://www.comptia.org/idapsearch?user-*
Having identified the attack, which of the following will prevent this type of attack on the web server?
Which of the following should the company do NEXT?
A breach at a credit card company resulted in customers credit card information being exposed . The
company has conducted a full forensic investigation and identified the source of the breach. Which of the
following should the company do NEXT?