Which of the following settings on the Unix server is the cause of this problem?
A systems administrator establishes a CIFS share on a Unix device to share data to windows
systems. The security authentication on the windows domain is set to the highest level. Windows
users are stating that they cannot authenticate to the Unix share. Which of the following settings
on the Unix server is the cause of this problem?
Which of the following BEST describes the core concerns of the security architect?
Company XYZ provides hosting services for hundreds of companies across multiple industries
including healthcare, education, and manufacturing. The security architect for company XYZ is
reviewing a vendor proposal to reduce company XYZ’s hardware costs by combining multiple
physical hosts through the use of virtualization technologies. The security architect notes concerns
about data separation, confidentiality, regulatory requirements concerning PII, and administrative
complexity on the proposal. Which of the following BEST describes the core concerns of the
security architect?
Which of the following will meet this goal without requiring any hardware pass-through implementations?
A security architect is designing a new infrastructure using both type 1 and type 2 virtual
machines. In addition to the normal complement of security controls (e.g. antivirus, host
hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store
cryptographic keys used to sign code and code modules on the VMs. Which of the following will
meet this goal without requiring any hardware pass-through implementations?
The MOST likely cause of this problem is that SE Linux is set to:
A Linux security administrator is attempting to resolve performance issues with new software
installed on several baselined user systems. After investigating, the security administrator
determines that the software is not initializing or executing correctly. For security reasons, the
company has implemented trusted operating systems with the goal of preventing unauthorized
changes to the configuration baseline. The MOST likely cause of this problem is that SE Linux is
set to:
Which of the following security controls should the auditor check for and recommend to be implemented if missi
A security auditor is conducting an audit of a corporation where 95% of the users travel or work
from non-corporate locations a majority of the time. While the employees are away from the
corporate offices, they retain full access to the corporate network and use of corporate laptops.
The auditor knows that the corporation processes PII and other sensitive data with applications
requiring local caches of any data being manipulated. Which of the following security controls
should the auditor check for and recommend to be implemented if missing from the laptops?
Which of the following is the reason for wiping the SAN LUNs?
Part of the procedure for decommissioning a database server is to wipe all local disks, as well as
SAN LUNs allocated to the server, even though the SAN itself is not being decommissioned.
Which of the following is the reason for wiping the SAN LUNs?
Which of the following BEST describes the implications of placing an IDS device inside or outside of the corpo
Which of the following BEST describes the implications of placing an IDS device inside or outside
of the corporate firewall?
Which of the following is the MOST likely cause of the problem and the BEST solution?
At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely
slow and/or unresponsive. The outage lasts for around 10 minutes, after which everything runs
properly again. The administrator has traced the problem to a lab of thin clients that are all booted
at 9:00 am each morning. Which of the following is the MOST likely cause of the problem and the
BEST solution? (Select TWO).
what is occurring and the BEST immediate response?
A security administrator is shown the following log excerpt from a Unix system:
2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914
ssh2
2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915
ssh2
2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916
ssh2
2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918
ssh2
2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920
ssh2
2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924
ssh2
Which of the following is the MOST likely explanation of what is occurring and the BEST
immediate response? (Select TWO).
which of the following?
The security administrator is reviewing the business continuity plan which consists of virtual
infrastructures at corporate headquarters and at the backup site. The administrator is concerned
that the VLAN used to perform live migrations of virtual machines to the backup site is across the
network provider’s MPLS network. This is a concern due to which of the following?