Which of the following would the security engineer MOST likely recommend based on the table?
— Exhibit —
Company management has indicated that instant messengers (IM) add to employee productivity.
Management would like to implement an IM solution, but does not have a budget for the project.
The security engineer creates a feature matrix to help decide the most secure product. Click on
the Exhibit button.
Which of the following would the security engineer MOST likely recommend based on the table?
Which of the following should the administrator perform to allow the program to be installed?
An administrator attempts to install the package “named.9.3.6-12-x86_64.rpm” on a server. Even
though the package was downloaded from the official repository, the server states the package
cannot be installed because no GPG key is found. Which of the following should the administrator
perform to allow the program to be installed?
Which of the following configurations would the administrators use?
Two storage administrators are discussing which SAN configurations will offer the MOST
confidentiality. Which of the following configurations would the administrators use? (Select TWO).
Which of the following BEST describes why this is necessary?
When generating a new key pair, a security application asks the user to move the mouse and type
random characters on the keyboard. Which of the following BEST describes why this is
necessary?
Which of the following represents the correct order of the investigation process?
Company XYZ has experienced a breach and has requested an internal investigation be
conducted by the IT Department. Which of the following represents the correct order of the
investigation process?
Which compliance category would this task be part of?
A medium-sized company has recently launched an online product catalog. It has decided to keep
the credit card purchasing in-house as a secondary potential income stream has been identified in
relation to sales leads. The company has decided to undertake a PCI assessment in order to
determine the amount of effort required to meet the business objectives. Which compliance
category would this task be part of?
Which of the following approaches would the network security administrator for Company XYZ MOST likely proceed
Company XYZ recently acquired a manufacturing plant from Company ABC which uses a different
manufacturing ICS platform. Company XYZ has strict ICS security regulations while Company
ABC does not. Which of the following approaches would the network security administrator for
Company XYZ MOST likely proceed with to integrate the new manufacturing plant?
Which of the following should the security administrator do to ensure the firewall platform is appropriate for
An Association is preparing to upgrade their firewalls at five locations around the United States.
Each of the three vendor’s RFP responses is in-line with the security and other requirements.
Which of the following should the security administrator do to ensure the firewall platform is
appropriate for the Association?
Based on this information, the following tasks should be completed:
CORRECT TEXT
The IDS has detected abnormal behavior on this network. Click on the network devices to view
device information. Based on this information, the following tasks should be completed:
1. Select the server that is a victim of a cross-site scripting (XSS) attack.
2 Select the source of the brute force password attack.
3. Modify the access control list (ACL) on the router(s) to ONLY block the XSS attack.
Instructions: Simulations can be reset at anytime to the initial state: however, all selections will be deleted
Which of the following MOST likely happened?
A UNIX administrator notifies the storage administrator that extra LUNs can be seen on a UNIX
server. The LUNs appear to be NTFS file systems. Which of the following MOST likely happened?