Which of the following is MOST likely occurring?
The security administrator notices a number of TCP connections from the development
department to the test network segregation. Large volumes of data are being transmitted between
the two networks only on port 22. Which of the following is MOST likely occurring?
which of the following?
A company that purchases insurance to reduce risk is an example of which of the following?
Which of the following are the BEST reasons to use an HSM?
Which of the following are the BEST reasons to use an HSM? (Select TWO).
Which of the following is a reason to perform user awareness and training?
Which of the following is a reason to perform user awareness and training?
which of the following?
When configuring multiple computers for RDP on the same wireless router, it may be necessary to
do which of the following?
which of the following are PII?
Used in conjunction, which of the following are PII? (Select TWO).
Which of the following can prevent an unauthorized employee from entering a datacenter?
Which of the following can prevent an unauthorized employee from entering a datacenter? (Select
TWO).
Which of the following would describe the use of encryption in this situation?
The security administrator is tasked with authenticating users to access an encrypted database.
Authentication takes place using PKI and the encryption of the database uses a separate
cryptographic process to decrease latency. Which of the following would describe the use of
encryption in this situation?
which of the following aspects of human authentication?
A proximity card reader is used to test which of the following aspects of human authentication?
Which of the following wireless security controls can be easily and quickly circumvented using only a network
Which of the following wireless security controls can be easily and quickly circumvented using only
a network sniffer? (Select TWO).