Which of the following protocols allows for secure transfer of files?
Which of the following protocols allows for secure transfer of files? (Select TWO).
Which of the following principles BEST explains why Mike’s attempt to connect is not successful?
Sara, a security administrator, is configuring a new firewall. She has entered statements into the
firewall configuration as follows:
Allow all Web traffic
Deny all Telnet traffic
Allow all SSH traffic
Mike, a user on the network, tries unsuccessfully to use RDP to connect to his work computer at
home. Which of the following principles BEST explains why Mike’s attempt to connect is not
successful?
Which of the following logs should Jane check?
Jane, a security administrator, notices that a program has crashed. Which of the following logs
should Jane check?
Which of the following concepts BEST describes this lack of access?
Users at a corporation are unable to login using the directory access server at certain times of the
day. Which of the following concepts BEST describes this lack of access?
Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?
Which ports and protocols are MOST likely to be open on the firewall?
During a penetration test from the Internet, Jane, the system administrator, was able to establish a
connection to an internal router, but not successfully log in to it. Which ports and protocols are
MOST likely to be open on the firewall? (Select FOUR).
Which statement BEST describes her privileges?
During an anonymous penetration test, Jane, a system administrator, was able to identify a shared
print spool directory, and was able to download a document from the spool. Which statement
BEST describes her privileges?
Which of the following is a common security coding issue?
Sara, an IT security technician, has identified security weaknesses within her company’s code.
Which of the following is a common security coding issue?
Which of the following is an application security coding problem?
Which of the following is an application security coding problem?
Which of the following BEST meets this need?
Matt, an IT security technician, needs to create a way to recover lost or stolen company devices.
Which of the following BEST meets this need?