Which of the following does this describe?
A company is installing a new security measure that would allow one person at a time to be
authenticated to an area without human interaction. Which of the following does this describe?
Which of the following types of testing does the company want performed?
A company hires outside security experts to evaluate the security status of the corporate network.
All of the company’s IT resources are outdated and prone to crashing. The company requests that
all testing be performed in a way which minimizes the risk of system failures. Which of the
following types of testing does the company want performed?
Which of the following would be used to mitigate this issue so that only security administrators can make chan
A security administrator notices that a specific network administrator is making unauthorized
changes to the firewall every Saturday morning. Which of the following would be used to mitigate
this issue so that only security administrators can make changes to the firewall?
which of the following?
When employees that use certificates leave the company they should be added to which of the
following?
which of the following attacks?
A security administrator notices large amounts of traffic within the network heading out to an
external website. The website seems to be a fake bank site with a phone number that when called,
asks for sensitive information. After further investigation, the security administrator notices that a
fake link was sent to several users. This is an example of which of the following attacks?
Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?
Several departments within a company have a business need to send high volumes of confidential
information to customers via email. Which of the following is the BEST solution to mitigate
unintentional exposure of confidential information?
Which of the following is the term used to describe these markings?
After a user performed a war driving attack, the network administrator noticed several similar
markings where WiFi was available throughout the enterprise. Which of the following is the term
used to describe these markings?
Which of the following is being described here?
An administrator is looking to implement a security device which will be able to not only detect
network intrusions at the organization level, but help defend against them as well. Which of the
following is being described here?
Which of the following would be a possible solution to look into to ensure their application remains secure an
The system administrator notices that their application is no longer able to keep up with the large
amounts of traffic their server is receiving daily. Several packets are dropped and sometimes the
server is taken offline. Which of the following would be a possible solution to look into to ensure
their application remains secure and available?
Which of the following types of user account options were enforced?
After a recent internal audit, the security administrator was tasked to ensure that all credentials
must be changed within 90 days, cannot be repeated, and cannot contain any dictionary words or
patterns. All credentials will remain enabled regardless of the number of attempts made. Which of
the following types of user account options were enforced? (Select TWO).