Which of the following tools might a security analyst use to determine services that are running on the server
A security manager believes that too many services are running on a mission critical database server. Which of the following tools might a security analyst use to determine services that are running on the server, without logging into the machine?
Which of the following describes software that is often written solely for a specific customers application?
Which of the following describes software that is often written solely for a specific customers application?
Which of the following steps should a technician take to allow this? (Select TWO)
Port 3535 is typically blocked for outbound traffic on a company’s LAN. An end-user has recently purchased a legitimate business program that needs to make outbound calls using this port. Which of the following steps should a technician take to allow this? (Select TWO).
The use of a physical token, PIN and a password during authentication is an example of which of the following?
The use of a physical token, PIN and a password during authentication is an example of which of the following?
Which of the following encryption technologies might BEST accomplish this?
An organization has recently implemented a work from home program. Employees need to connect securely from home to the corporate network. Which of the following encryption technologies might BEST accomplish this?
Which of the following hashing techniques is commonly disabled to make password cracking more difficult?
Which of the following hashing techniques is commonly disabled to make password cracking more difficult?
Which of the following is the MOST likely reason for the risk being raised?
A financial institution performed a risk assessment on the DLT backup system used to store customer account details. The main risk highlighted was the long-term retention of electronically stored data. Which of the following is the MOST likely reason for the risk being raised?
Which of the following BEST describes risk analysis?
Which of the following BEST describes risk analysis?
The primary function of risk management in an organization is to reduce risk to a level:
The primary function of risk management in an organization is to reduce risk to a level:
Which of the following are MOST likely to be analyzed by Internet filter appliances/servers? (Select THREE)
Which of the following are MOST likely to be analyzed by Internet filter appliances/servers? (Select THREE).