Which of the following is the MOST important the security manager must rely upon to help make this determinati
A security manager is discussing change in the security posture of the network, if a proposed application
is approved for deployment. Which of the following is the MOST important the security manager must
rely upon to help make this determination?
Which of the following would be BEST course of action?
Joe the system administrator has noticed an increase in network activity from outside sources. He wishes
to direct traffic to avoid possible penetration while heavily monitoring the traffic with little to no impact
on the current server load. Which of the following would be BEST course of action?
Which of the following should the administrator do to verify if this is indeed a false positive?
An assessment too reports that the company’s web server may be susceptible to remote buffer overflow.
The web server administrator insists that the finding is a false positive. Which of the following should the
administrator do to verify if this is indeed a false positive?
which of the following firewall rules would accomplish this objective?
The sales force in an organization frequently travel to remote sites and requires secure access to an
internal server with an IP address of 192.168.0.220. Assuming services are using default ports, which of
the following firewall rules would accomplish this objective? (Select Two)
Which of the following will provide data encryption, key management and secure application launching?
Which of the following will provide data encryption, key management and secure application launching?
which of the following?
It is MOST difficult to harden against which of the following?
Which of the following is the BEST document that the company should prepare to negotiate with the ISP?
A company has experienced problems with their ISP, which has failed to meet their informally agreed
upon level of service. However the business has not negotiated any additional formal agreements beyondthe standard customer terms. Which of the following is the BEST document that the company should
prepare to negotiate with the ISP?
Which of the following authentication services accomplishes this objective?
A company would like to implement two-factor authentication for its vulnerability management database
to require system administrators to use their token and random PIN codes. Which of the following
authentication services accomplishes this objective?
Which of the following is considered the MOST secure way to handle master keys associated with these certifica
A company has a corporate infrastructure where end users manage their own certificate keys. Which of
the following is considered the MOST secure way to handle master keys associated with these
certificates?
Which of the following controls would BEST mitigate this issue?
A recent audit has revealed that several users have retained permissions to systems they should no
longer have rights to after being promoted or changed job positions. Which of the following controls
would BEST mitigate this issue?