Which of the following assessment types should the security administrator also take into consideration while e
A new enterprise solution is currently being evaluated due to its potential to increase the company’s profit margins. The security administrator has been asked to review its security implications. While evaluating the product, various vulnerability scans were performed. It was determined that the product is not a threat but has the potential to introduce additional vulnerabilities. Which of the following assessment types should the security administrator also take into consideration while evaluating this product?
Which of the following describes this form of authentication?
In order to access the network, an employee must swipe their finger on a device. Which of the following describes this form of authentication?
Which of the following methods of access, authentication, and authorization is the MOST secure by default?
Which of the following methods of access, authentication, and authorization is the MOST secure by default?
A Human Resource manager is assigning access to users in their specific department performing the same job fun
A Human Resource manager is assigning access to users in their specific department performing the same job function. This is an example of:
MAC filtering is a form of which of the following?
MAC filtering is a form of which of the following?
Which of the following tools provides the ability to determine if an application is transmitting a password in
Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Actively monitoring data streams in search of malicious code or behavior is an example of:
Actively monitoring data streams in search of malicious code or behavior is an example of:
A certificate that has been compromised should be published to which of the following?
A certificate that has been compromised should be published to which of the following?
NTLM is an improved and substantially backwards compatible replacement for which of the following?
NTLM is an improved and substantially backwards compatible replacement for which of the following?
Which of the following BEST describes this type of malware?
A user downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?