Which of the following is the MOST effective method to accomplish this?
To combat transaction fraud, a bank has implemented a requirement that all bank customers enter a different, unique code to confirm every transaction. Which of the following is the MOST effective method to accomplish this?
Which of the following BEST describes the administrators recommendation?
An administrator recommends that management establish a trusted third party central repository to maintain all employees private keys. Which of the following BEST describes the administrators recommendation?
Penetration testing should only be used once which of the following items is in place?
Penetration testing should only be used once which of the following items is in place?
which of the following BEST describes an access control system which implements a non-trusted but secure zone
In regards to physical security, which of the following BEST describes an access control system which implements a non-trusted but secure zone immediately outside of the secure zone?
Which of the following tools could be used to determine the cause of the service degradation?
A technician notices delays in mail delivery on the mail server. Which of the following tools could be used to determine the cause of the service degradation?
Which of the following additional controls could be implemented?
An administrator is asked to improve the physical security of a data center located inside the office building. The data center already maintains a physical access log and has a video surveillance system. Which of the following additional controls could be implemented?
Which of the following threats are being addressed?
An administrator recommends implementing whitelisting, blacklisting, closing-open relays, and strong authentication techniques to a server administrator. Which of the following threats are being addressed?
Which of the following is used to deny authorized users access to services?
Which of the following is used to deny authorized users access to services?
Which of the following is this an example of?
An administrator is worried about an attacker using a compromised user account to gain administrator access to a system. Which of the following is this an example of?
Which of the following is this an example of?
Human Resources has requested that staff members be moved to different parts of the country into new positions. Which of the following is this an example of?