Which of the following is a management control?
Which of the following is a management control?
which of the following steps is MOST important?
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-topeer network that cannot connect to the Internet. The ISSO can update the antivirus definitions
manually, but which of the following steps is MOST important?
Which of the following security strategies allows a company to limit damage to internal systems and provides l
Which of the following security strategies allows a company to limit damage to internal systems
and provides loss control?
Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username,
password, and a four digit PIN. Which of the following authentication methods is Sara using?
Which of the following is the BEST service for Ann to implement?
Ann has taken over as the new head of the IT department. One of her first assignments was to
implement AAA in preparation for the company’s new telecommuting policy. When she takes
inventory of the organizations existing network infrastructure, she makes note that it is a mix of
several different vendors. Ann knows she needs a method of secure centralized access to the
company’s network resources. Which of the following is the BEST service for Ann to implement?
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Which of the following BEST explains why Ann is not required to change her password?
A group policy requires users in an organization to use strong passwords that must be changed
every 15 days. Joe and Ann were hired 16 days ago. When Joe logs into the network, he is
prompted to change his password; when Ann logs into the network, she is not prompted to change
her password. Which of the following BEST explains why Ann is not required to change her
password?
Which of the following application attacks is used to gain access to SEH?
Which of the following application attacks is used to gain access to SEH?
Which of the following services should be disabled to ensure secure communications?
A new web server has been provisioned at a third party hosting provider for processing credit card
transactions. The security administrator runs the netstat command on the server and notices that
ports 80, 443, and 3389 are in a ‘listening’ state. No other ports are open. Which of the following
services should be disabled to ensure secure communications?
Which of the following is an authentication service that uses UDP as a transport medium?
Which of the following is an authentication service that uses UDP as a transport medium?