Which of the following could be utilized to notify the network support group when computers without the antivi
Recently the desktop support group has been performing a hardware refresh and has replaced numerous
computers. An auditor discovered that a number of the new computers did not have the company’s
antivirus software installed on them, Which of the following could be utilized to notify the network
support group when computers without the antivirus software are added to the network?
Which of the following actions should be performed?
An administrator needs to protect against downgrade attacks due to various vulnerabilities in SSL/TLS.
Which of the following actions should be performed? (Select TWO)
Which of the following would BEST satisfy these requirements?
A developer needs to utilize AES encryption in an application but requires the speed of encryption and
decryption to be as fast as possible. The data that will be secured is not sensitive so speed is valued over
encryption complexity. Which of the following would BEST satisfy these requirements?
This is an example of:
During a code review a software developer discovers a security risk that may result in hundreds of hours
of rework. The security team has classified these issues as low risk. Executive management has decided
that the code will not be rewritten. This is an example of:
Which of the following would have prevented the network outage?
A network was down for several hours due to a contractor entering the premises and plugging both ends
of a network cable into adjacent network jacks. Which of the following would have prevented the
network outage? (Select Two)
Which of the following attacks may be occurring?
After disabling SSID broadcast, a network administrator still sees the wireless network listed in available
networks on a client laptop. Which of the following attacks may be occurring?
Which of the following job roles should receive training on forensics, chain of custody, and the order of vola
A security manager is preparing the training portion of an incident plan. Which of the following job roles
should receive training on forensics, chain of custody, and the order of volatility?
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is calle
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is
called:
Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
Which of the following is a proprietary protocol commonly used for router authentication across an
enterprise?
Which of the following commands can be used to see processes that are listening on a TCP port?
While responding to an incident on a new Windows server, the administrator needs to disable unused
services. Which of the following commands can be used to see processes that are listening on a TCP port?