Which of the following risk mitigation startegies should have been implemented when the supervisor was demoted
A supervisor in your organization was demoted on Friday afternoon. The supervisor had the ability to
modify the contents of a confidential database, as well as other managerial permissions. On Monday
morning, the database administrator reported that log files indicated that several records were missing
from the database. Which of the following risk mitigation startegies should have been implemented
when the supervisor was demoted?
Which of the following attack types is being carried out where a target is being sent unsolicited messages via
Which of the following attack types is being carried out where a target is being sent unsolicited messages
via Bluetooth?
Which of the following would explain the situation?
Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe
receives a response, he is unable to decrypt the response with the same key he used initially. Which of
the following would explain the situation?
Which of the following principles of social engineering mad attack successful?
Recently several employees were victims of a phishing email that appeared to originate from the
company president. The email claimed the employees would be disciplined if they did not click on a
malicious link in the message. Which of the following principles of social engineering mad attack
successful?
Which of the following is the LEAST secure hashing algorithm?
Which of the following is the LEAST secure hashing algorithm?
which of the of the following security exposures would this lead to?
An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the of the
following security exposures would this lead to?
Which of the following encrypts data a single bit at a time?
Which of the following encrypts data a single bit at a time?
which of the following would be the BEST method for reducing the risk of having the laptops compromised?
A business has recently deployed laptops to all sales employees. The laptops will be used primarily from
home offices and while traveling, and a high amount of wireless mobile use is expected. To protect the
laptops while connected to untrusted wireless networks, which of the following would be the BEST
method for reducing the risk of having the laptops compromised?
Which of the following encryption solutions should be deployed in this situation?
A Security Officer on a military base needs to encrypt several smart phones that will be going into
the field. Which of the following encryption solutions should be deployed in this situation?
Which of the following is the reason the manager installed the racks this way?
A network operations manager has added a second row of server racks in the datacenter. These racks
face the opposite direction of the first row of racks. Which of the following is the reason the manager
installed the racks this way?