Which of the following describes this cause?
A vulnerability scan is reporting that patches are missing on a server. After a review, it is determined that the
application requiring the patch does not exist on the operating system.
Which of the following describes this cause?
Which of the following can result in significant admini…
Which of the following can result in significant administrative overhead from incorrect reporting?
Which of the following is a management control?
Which of the following is a management control?
Which of the following controls is being described in t…
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock thePC after five minutes of inactivity. Which of the following controls is being described in this situation?
which applications a user can install and run on a comp…
Which of the following technical controls is BEST used to define which applications a user can install and run
on a company issued mobile device?
What are three of the primary security control types th…
What are three of the primary security control types that can be implemented?
Which of the following MUST happen before the server ca…
A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication works fine, but
VLAN 12 does not. Which of the following MUST happen before the server can communicate on VLAN 12?
Which of the following would be the BEST course of acti…
A retail store uses a wireless network for its employees to access inventory from anywhere in the store. Due to
concerns regarding the aging wireless network, the store manager has brought in a consultant to harden the
network. During the site survey, the consultant discovers that the network was using WEP encryption. Which of
the following would be the BEST course of action for the consultant to recommend?
Which of the following network segmentation schemas wou…
An organization has three divisions: Accounting, Sales, and Human Resources. Users in the Accounting
division require access to a server in the Sales division, but no users in the Human Resources division should
have access to resources in any other division, nor should any users in the Sales division have access to
resources in the Accounting division. Which of the following network segmentation schemas would BEST meet
this objective?
Signed digital certificates used to secure communicatio…
Signed digital certificates used to secure communication with a web server are MOST commonly associated
with the following ports: