Which of the following steps did the administrator perform?
A security Operations Center was scanning a subnet for infections and found a contaminated machine. One of
the administrators disabled the switch port that the machine was connected to, and informed a local technician
of the infection. Which of the following steps did the administrator perform?
Which of the following will accomplish the security man…
The security manager must store a copy of a sensitive document and needs to verify at a later point that the
document has not been altered. Which of the following will accomplish the security manager’s objective?
Which of the following would BEST mitigate this?
A security administrator has concerns that employees are installing unapproved applications on their company
provide smartphones. Which of the following would BEST mitigate this?
Which of the following authentication factors are being…
Internet banking customers currently use an account number and password to access their online accounts.
The bank wants to improve security on high value transfers by implementing a system which call users back on
a mobile phone to authenticate the transaction with voice verification. Which of the following authentication
factors are being used by the bank?
Which of the following would allow the organization to …
An organization has a need for security control that identifies when an organizational system has been
unplugged and a rouge system has been plugged in. The security control must also provide the ability to supply
automated notifications. Which of the following would allow the organization to BEST meet this business
requirement?
Which of the following is the FIRST step the technician…
A technician wants to secure communication to the corporate web portal, which is currently using HTTP. Which
of the following is the FIRST step the technician should take?
Which of the following steps of incident response does …
Which of the following steps of incident response does a team analyze the incident and determine steps to
prevent a future occurrence?
Which of the following is replayed during wireless auth…
Which of the following is replayed during wireless authentication to exploit a weak key infrastructure?
which of the following concepts?
Identifying residual is MOST important to which of the following concepts?
Which of the following is MOST critical in protecting c…
Which of the following is MOST critical in protecting control systems that cannot be regularly patched?