This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the computer and
finds that a service called Telnet is running and connecting to an external website over port 443. This Telnet
service was found by comparing the system’s services to the list of standard services on the company’s system
image. This review process depends on:
Which of the following would be the MOST appropriate?
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following
would be the MOST appropriate? (Choose two.)
Which of the following can be used as an equipment thef…
Which of the following can be used as an equipment theft deterrent?
Which of the following devices will help prevent a lapt…
Which of the following devices will help prevent a laptop from being removed from a certain location?
Which of the following security mechanism would be MOST…
Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the company’s
financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe’s
suspicion?
Which of the following MOST interferes with network-bas…
Which of the following MOST interferes with network-based detection techniques?
Which of the following is an important step in the init…
Which of the following is an important step in the initial stages of deploying a host-based firewall?
Which of the following BEST describes this implementation?
Each server on a subnet is configured to only allow SSH access from the administrator’s workstation. Which of
the following BEST describes this implementation?
Which of the following should Pete implement to BEST ac…
Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all
computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this
goal?
Which of the following concepts does this illustrate?
A technician has implemented a system in which all workstations on the network will receive security updates
on the same schedule. Which of the following concepts does this illustrate?