Which of the following devices provides storage for RSA or asymmetric keys and may assist in user authenticati
Which of the following devices provides storage for RSA or asymmetric keys and may assist in user authentication? (Select TWO).
Which of the following solutions would allow the small company to save money on hiring additional personnel an
A small company needs to invest in a new expensive database. The company’s budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional personnel and minimize the footprint in their current datacenter?
Which of the following protocols should be used for the tunnel?
A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Which of the following BEST describes this type of attack?
When examining HTTP server logs the security administrator notices that the company’s online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
Which of the following could be implemented?
An administrator in a small office environment has implemented an IDS on the network perimeter to detect malicious traffic patterns. The administrator still has a concern about traffic inside the network originating between client workstations. Which of the following could be implemented?
Which of the following MUST a programmer implement to prevent cross-site scripting?
Which of the following MUST a programmer implement to prevent cross-site scripting?
Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of
Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of data making it susceptible to brute force attacks?
Which of the following should be used to help prevent device theft of unused assets?
Which of the following should be used to help prevent device theft of unused assets?
Which of the following security practices should occur initially in software development?
Which of the following security practices should occur initially in software development?
Which of the following uses tickets to identify users to the network?
Which of the following uses tickets to identify users to the network?