Which of the following encryption methods offers this capability?
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the
same level of encryption strength with a lower key length than is typically necessary. Which of the
following encryption methods offers this capability?
Which of the following is the ALE that Sara should report to management for a security breach?
Sara, a security analyst, is trying to prove to management what costs they could incur if their
customer database was breached. This database contains 250 records with PII. Studies show that
the cost per record for a breach is $300. The likelihood that their database would be breached in
the next year is only 5%. Which of the following is the ALE that Sara should report to management
for a security breach?
Which of the following design elements will enable Matt to meet this objective?
Matt must come up with a design solution which will enable remote users to securely access
network resources. Which of the following design elements will enable Matt to meet this objective?
Which of the following would BEST meet this objective?
Sara, a security technician, has been asked to design a solution which will enable external users
to have access to a Web server, while keeping the internal network unaffected by this access.
Which of the following would BEST meet this objective?
Which of the following ports should be opened on the firewall?
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the
following ports should be opened on the firewall?
Which of the following design elements would mitigate ARP spoofing attacks?
Matt, a security technician, notices a high number of ARP spoofing attacks on his network. Which
of the following design elements would mitigate ARP spoofing attacks?
Which of the following backup types would BEST meet the organization’s needs?
Matt works for an organization that requires data to be recovered in the shortest amount of time
possible. Which of the following backup types would BEST meet the organization’s needs?
Which of the following does this represent?
Sara, a security architect, has developed a framework in which several authentication servers
work together to increase processing power for an application. Which of the following does this
represent?
How would a technician secure a router configuration if placed in an unsecured closet?
How would a technician secure a router configuration if placed in an unsecured closet?
Which of the following firewall rules would only block tftp traffic and record it?
Which of the following firewall rules would only block tftp traffic and record it?