Which of the following will BEST meet this requirement?
An IT security technician needs to establish host based security for company workstations. Which
of the following will BEST meet this requirement?
Which of the following BEST describes this type of malware?
Jane, an IT security technician, receives a call from the vulnerability assessment team informing
her that port 1337 is open on a user’s workstation. Which of the following BEST describes this
type of malware?
Which of the following is the MOST specific plan for various problems that can arise within a system?
Which of the following is the MOST specific plan for various problems that can arise within a
system?
Which of the following would issue Pete a certificate?
Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a
certificate?
Which of the following BEST describes the weakness in WEP encryption?
Which of the following BEST describes the weakness in WEP encryption?
Which of the following is used to ensure message integrity during a TLS transmission?
Which of the following is used to ensure message integrity during a TLS transmission?
Which of the following should Sara do to address the risk?
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years.
Each breach has cost the company $3,000. A third party vendor has offered to repair the security
hole in the system for $25,000. The breached system is scheduled to be replaced in five years.
Which of the following should Sara do to address the risk?
Which of the following BEST describes this penetration test?
A company has asked Pete, a penetration tester, to test their corporate network. Pete was
provided with all of the server names, configurations, and corporate IP addresses. Pete was then
instructed to stay off of the Accounting subnet as well as the company web server in the DMZ.
Pete was told that social engineering was not in the test scope as well. Which of the following
BEST describes this penetration test?
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and
Which of the following is an authentication and accounting service that uses TCP for connecting to
routers and switches?
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on
a production system?