which of the following administrative control policy considerations MUST be addressed?
If an organization wants to implement a BYOD policy, which of the following administrative control policy
considerations MUST be addressed? (Select two)
Which of the following should the technician implement?
A security technician wants to implement stringent security controls over web traffic by restricting the
client source TCP ports allowed through the corporate firewall. Which of the following should the
technician implement?
Which of the following design elements would be used to segment the network based on organizational groups?
An administrator is configuring a network for all users in a single building. Which of the following design
elements would be used to segment the network based on organizational groups? (Select two)
Which of the following options could improve the safety and security of the datacenter further?
A datacenter has suffered repeated burglaries which led to equipment theft and arson. In the past, the
thieves have demonstrated a determination to bypass any installed safeguards. After mantraps were
installed to prevent tailgating, the thieves crashed through the wall of datacenter with a vehicle after
normal business hours. Which of the following options could improve the safety and security of the
datacenter further? (Select two)
Which of the following can take advantage of man in the middle techniques to prevent data exfiltration?
Which of the following can take advantage of man in the middle techniques to prevent data exfiltration?
Which of the following could be used?
An administrator must select an algorithm to encrypt data at rest. Which of the following could be used?
which of the following?
RC4 is a strong encryption protocol that is general used with which of the following?
Which of the following should the consultant do in order to produce more accurate results?
An outside security consultant produces a report of several vulnerabilities for a particular server. Upon
further investigation, it is determine that the vulnerability reported does not apply to the platform the
server is running on. Which of the following should the consultant do in order to produce more accurate
results?
which of the following types of attack is this application susceptible?
A programmer has allocated a 32 bit variable to store the results of an operation between two user
supplied 4 byte operands. To which of the following types of attack is this application susceptible?
Which of the following would be the best way to prevent this type of attack from occurring again?
A security administrator is reviewing logs and notices multiple attempts to access the HVAC controls by a
workstation with an IP address from the open wireless network. Which of the following would be the best
way to prevent this type of attack from occurring again?