Which of the following would be a BEST practice to secure the servers? (Select TWO).
A database server containing personal information and a file server containing non-critical information must be secured. Which of the following would be a BEST practice to secure the servers? (Select TWO).
Which of the following attacks would this BEST describe?
A company is experiencing an extraordinary amount of web traffic that is crippling the server. The web traffic suddenly stops. The mail server experiences the same amount of traffic as before then crashes. Which of the following attacks would this BEST describe?
Which of the following control types BEST explains this anomaly?
Matt, an account manager, arrives at work early in the morning and cannot log into his workstation. He calls the help desk an hour later to open a trouble ticket, but they tell him there is nothing wrong with his account. Matt tries his login once more and is granted access. Which of the following control types BEST explains this anomaly?
Which of the following would ensure confidentiality and authorization to the management interface of a router?
Which of the following would ensure confidentiality and authorization to the management interface of a router?
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following concepts BEST explains the support for fraud detection?
A security technician is attempting to explain why some of the company policies should be changed for high risk IT positions. Which of the following concepts BEST explains the support for fraud detection?
With which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls at the companys demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?
Which of the following are smart cards? (Select TWO).
Sara, a security administrator, has been tasked with explaining smart cards to the companys management team. Which of the following are smart cards? (Select TWO).
Which of the following solutions BEST relates to the host authentication protocol within the companys environm
Jane, a security administrator, has been tasked with explaining authentication services to the companys management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the companys environment?
Which of the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x I
Jane, a security architect, is implementing security controls throughout her organization. Which of the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x Impact?