Which of the following is a BEST practice when implementing a new system?
Which of the following is a BEST practice when implementing a new system?
After conducting a risk assessment, the main focus of an administrator should be which of the following?
After conducting a risk assessment, the main focus of an administrator should be which of the following?
All of the following are methods used to conduct risk assessments EXCEPT:
All of the following are methods used to conduct risk assessments EXCEPT:
From a security standpoint, which of the following is the BEST reason to implement performance monitoring appl
From a security standpoint, which of the following is the BEST reason to implement performance monitoring applications on network systems?
Which of the following is a cryptographic hash function?
Which of the following is a cryptographic hash function?
As a best practice, risk assessments should be based upon which of the following?
As a best practice, risk assessments should be based upon which of the following?
USB drives create a potential security risk due to which of the following?
USB drives create a potential security risk due to which of the following?
The security administrator advises the marketing department not to distribute the USB pens due to which of the
The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks which led to a loss of sensitive data. The security administrator advises the marketing department not to distribute the USB pens due to which of the following?
Which of the following would have provided an alternative simpler solution?
To facilitate compliance with the Internet use portion of the corporate acceptable use policy, an administrator implements a series of proxy servers and firewalls. The administrator further recommends installation of software based firewalls on each host on the network. Which of the following would have provided an alternative simpler solution?
Which of the following authentication combinations is a three-factor system?
To increase the security of the network authentication process, an administrator decides to implement three factor authentication. Which of the following authentication combinations is a three-factor system?