Which of the following provides the BEST solution?
A corporation has experienced several media leaks of proprietary data on various web forums. The posts were
made during business hours and it is believed that the culprit is posting during work hours from a corporate
machine. The Chief Information Officer (CIO) wants to scan internet traffic and keep records for later use in
legal proceedings once the culprit is found. Which of the following provides the BEST solution?
Which of the following poses the greatest risk with thi…
Users can authenticate to a company’s web applications using their credentials form a popular social media
site. Which of the following poses the greatest risk with this integration?
Which of the following BEST would protect the building …
The Chief Security Officer (CSO) for a datacenter in a hostile environment, is concerned about protecting the
facility from car bomb attacks. Which of the following BEST would protect the building from this threat?
(Choose two.)
Which of the following did the organization fail to pro…
After an audit, it was discovered that an account was not disabled in a timely manner after an employee has
departed from the organization. Which of the following did the organization fail to properly implement?
Which of the following default ports on the firewall mu…
The finance department just procured a software application that needs to communicate back to the vendor
server via SSL. Which of the following default ports on the firewall must the security engineer open to
accomplish this task?
Which of the following authentication services is being…
A system administrator is configuring shared secrets on servers and clients. Which of the following
authentication services is being deployed by the administrator? (Choose two.)
Which of the following is MOST likely the cause for the…
A user attempts to install new and relatively unknown software recommended by a colleague. The user is
unable to install the program, despite having successfully installed other programs previously. Which of the
following is MOST likely the cause for the user’s inability to complete the installation?
Which of the following logs should the administrator se…
A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day
attack against a user program running on the server. Which of the following logs should the administrator
search for information regarding the breach?
Which of the following is this known as?
A network administrator has identified port 21 being open and the lack of an IDS as a potential risk to the
company. Due to budget constraints, FTP is the only option that the company can is to transfer data and
network equipment cannot be purchased. Which of the following is this known as?
Which of the following should the administrator deploy?
A security administrator wants to block unauthorized access to a web server using a locally installed softwareprogram. Which of the following should the administrator deploy?