Which of the following attacks would this BEST describe?
A company is experiencing an extraordinary amount of web traffic that is crippling the server. The
web traffic suddenly stops. The mail server experiences the same amount of traffic as before then
crashes. Which of the following attacks would this BEST describe?
Which of the following control types BEST explains this anomaly?
Matt, an account manager, arrives at work early in the morning and cannot log into his
workstation. He calls the help desk an hour later to open a trouble ticket, but they tell him there is
nothing wrong with his account. Matt tries his login once more and is granted access. Which of the
following control types BEST explains this anomaly?
Which of the following would ensure confidentiality and authorization to the management interface of a router?
Which of the following would ensure confidentiality and authorization to the management interface
of a router?
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following concepts BEST explains the support for fraud detection?
A security technician is attempting to explain why some of the company policies should be
changed for high risk IT positions. Which of the following concepts BEST explains the support for
fraud detection?
which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls at the
company’s demarc as part of the initiation of configuration management processes. One of the
network technicians asks the security technician to explain the access control type found in a
firewall. With which of the following should the security technician respond?
Which of the following are smart cards?
Sara, a security administrator, has been tasked with explaining smart cards to the company’s
management team. Which of the following are smart cards? (Select TWO).
Which of the following solutions BEST relates to the host authentication protocol within the company’s envir
Jane, a security administrator, has been tasked with explaining authentication services to the
company’s management team. The company runs an active directory infrastructure. Which of the
following solutions BEST relates to the host authentication protocol within the company’s
environment?
Which of the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x I
Jane, a security architect, is implementing security controls throughout her organization. Which of
the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x
Impact?
which of the following?
The information security department regularly walks the campus and around the buildings looking
for unauthorized open wireless networks. This is an example of which of the following?