Which of the following cryptographic related browser settings allows an organization to communicate securely?
Which of the following cryptographic related browser settings allows an organization to
communicate securely?
Which of the following secure file transfer methods uses port 22 by default?
Which of the following secure file transfer methods uses port 22 by default?
Which of the following is the BEST reason to provide user awareness and training programs for organizational s
Which of the following is the BEST reason to provide user awareness and training programs for
organizational staff?
which of the following should Pete, an administrator, avoid implementing?
While setting up a secure wireless corporate network, which of the following should Pete, an
administrator, avoid implementing?
Which of the following correctly lists the protocols blocked and allowed?
A firewall technician has been instructed to disable all non-secure ports on a corporate firewall.
The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed
traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and
allowed?
Which of the following BEST describes the procedure and security rationale for performing such reviews?
A security administrator is responsible for performing periodic reviews of user permission settings
due to high turnover and internal transfers at a corporation. Which of the following BEST describes
the procedure and security rationale for performing such reviews?
Which of the following would MOST likely help them achieve their objectives?
Due to limited resources, a company must reduce their hardware budget while still maintaining
availability. Which of the following would MOST likely help them achieve their objectives?
The system administrator records the system time of all servers to ensure that:
A system administrator is responding to a legal order to turn over all logs from all company
servers. The system administrator records the system time of all servers to ensure that:
Which of the following programs can be installed on his machine to help prevent this from happening?
A user has several random browser windows opening on their computer. Which of the following
programs can be installed on his machine to help prevent this from happening?
While rarely enforced, mandatory vacation policies are effective at uncovering:
While rarely enforced, mandatory vacation policies are effective at uncovering: