which of the following data types will be unavailable for later investigation?
Logs from an IDS show that a computer has been compromised with a botnet and is actively
communicating with a command and control server. If the computer is powered off, which of the
following data types will be unavailable for later investigation?
which of the following?
A security administrator ensures that certain characters and commands entered on a web server
are not interpreted as legitimate data and not passed on to backend servers. This is an example of
which of the following?
Which of the following can the administrator MOST easily employ to prevent this unsecure practice, with the le
An administrator has implemented a policy that passwords expire after 60 days and cannot match
their last six previously used passwords. Users are bypassing this policy by immediately changing
their passwords six times and then back to the original password. Which of the following can the
administrator MOST easily employ to prevent this unsecure practice, with the least administrative
effort?
Which of the following will provide the HIGHEST level of wireless network security?
Which of the following will provide the HIGHEST level of wireless network security?
Which of the following is a requirement when implementing PKI if data loss is unacceptable?
Which of the following is a requirement when implementing PKI if data loss is unacceptable?
Which of the following is an unauthorized wireless router that allows access to a secure network?
Which of the following is an unauthorized wireless router that allows access to a secure network?
Where should the administrator look to determine if this is normal behavior?
The server log shows 25 SSH login sessions per hour. However, it is a large company and the
administrator does not know if this is normal behavior or if the network is under attack. Where
should the administrator look to determine if this is normal behavior?
which are calculated against a finite field?
Which of the following cryptography types provides the same level of security but uses smaller key
sizes and less computational resources than logarithms which are calculated against a finite field?
Which of the following configurations BEST fits the need for each system?
Two systems are being designed. System A has a high availability requirement. System B has a
high security requirement with less emphasis on system uptime. Which of the following
configurations BEST fits the need for each system?
Which of the following MUST be implemented in conjunction with password history, to prevent a user from re-usi
Which of the following MUST be implemented in conjunction with password history, to prevent a
user from re-using the same password?