Which of the following would be an appropriate mitigati…
A system security analyst using an enterprise monitoring tool notices an unknown internal host exfiltrating files to several foreign IP addresses. Which of the
following would be an appropriate mitigation technique?
Which of the following controls would allow a company t…
Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?
Which of the following implementation steps would be ap…
Which of the following implementation steps would be appropriate for a public wireless hot- spot?
Which of the following can be implemented if a security…
Which of the following can be implemented if a security administrator wants only certain devices connecting to the wireless network?
Which of the following is the MOST likely reason the us…
A new virtual server was created for the marketing department. The server was installed on an existing host machine. Users in the marketing department report
that they are unable to connect to the server. Technicians verify that the server has an IP address in the same VLAN as the marketing department users. Which of
the following is the MOST likely reason the users are unable to connect to the server?
Which of the following would BEST address this desire?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide
network access for this group only. Which of the following would BEST address this desire?
How must user accounts for exiting employees be handled?
How must user accounts for exiting employees be handled?
Which of the following can be implemented to increase s…
An administrator notices that former temporary employees’ accounts are still active on a domain. Which of the following can be implemented to increase security
and prevent this from happening?
Which of the following would mitigate and secure the au…
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts were later identified as contractors’ accounts who would be
returning in three months and would need to resume the activities. Which of the following would mitigate and secure the auditors finding?
Which of the following can the CTO implement requiring …
The Chief Technology Officer (CTO) wants to improve security surrounding storage of customer passwords.
The company currently stores passwords as SHA hashes. Which of the following can the CTO implement requiring the LEAST change to existing systems?