Which of the following combinations should be used to i…
A security administrator would like to write an access rule to block the three IP addresses given below. Which
of the following combinations should be used to include all of the given IP addresses?
192.168.12.255
192.168.12.227
192.168.12.229
Which of the following is this an example of?
Joe processes several requisitions during the day and during the night shift they are approved by Ann.
Which of the following is this an example of?
Establishing a method to erase or clear memory is an ex…
Establishing a method to erase or clear memory is an example of securing the following:
Which of the following has the GREATEST impact on the t…
A system administrator wants to configure a setting that will make offline password cracking more challenging.
Currently the password policy allows upper and lower case characters a minimum length of 5 and a lockout
after 10 invalid attempts. Which of the following has the GREATEST impact on the time it takes to crack the
passwords?
Which of the following is the MOST important considerat…
A security administrator is installing a single camera outside in order to detect unauthorized vehicles in the
parking lot. Which of the following is the MOST important consideration when deploying a CCTV camera to
meet the requirement?
Is this directlysupported by SAML?
A web startup wants to implement single sign-on where its customers can log on to the site by using their
personal and existing corporate email credentials regardless of which company they work for. Is this directlysupported by SAML?
Deploying compensating security controls is an example of:
Deploying compensating security controls is an example of:
Which of the following stages if the Incident Handling …
A network security analyst has confirmed that the public facing web server has been compromised. Which of
the following stages if the Incident Handling Response does this describe?
Which of the following attacks is generally initiated f…
Which of the following attacks is generally initiated from a botnet?
Which of the following should he perform?
After making a bit-level copy of compromised server, the forensics analyst Joe wants to verify that he bid not
accidentally make a change during his investigation. Which of the following should he perform?