Which of the following steps should follow the deployment of a patch?
Which of the following steps should follow the deployment of a patch?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following log types would the administrator check?
A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?
which of the following best practices would he implement?
If Pete, a security administrator, wants to ensure that certain users can only gain access to the system during their respective shifts, which of the following best practices would he implement?
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized acce
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?
Which of the following would BEST meet their request?
A small business owner has asked the security consultant to suggest an inexpensive means to deter physical intrusions at their place of business. Which of the following would BEST meet their request?
Which of the following describes this access control type?
Employee badges are encoded with a private encryption key and specific personal information.
The encoding is then used to provide access to the network. Which of the following describes this access control type?
Which of the following devices would MOST likely have a DMZ interface?
Which of the following devices would MOST likely have a DMZ interface?
Which of the following attack types is underway?
A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?
Which of the following tools would Matt, a security administrator, MOST likely use to analyze a malicious payl
Which of the following tools would Matt, a security administrator, MOST likely use to analyze a malicious payload?