Which of the following security controls is the hacker exploiting?
A hacker has discovered a simple way to disrupt business for the day in a small company which
relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely
working staff access to company systems with a script. Which of the following security controls is
the hacker exploiting?
Which of the following will MOST likely be performed?
A security specialist has been asked to evaluate a corporate network by performing a vulnerability
assessment. Which of the following will MOST likely be performed?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the
accounting department. Part of their new duties will be to check the daily balance sheet
calculations on spreadsheets that are restricted to the accounting group. In which of the following
ways should the account be handled?
Which of the following should the technician do to gather information about the configuration of the wireless
A security technician is attempting to access a wireless network protected with WEP. The
technician does not know any information about the network. Which of the following should the
technician do to gather information about the configuration of the wireless network?
Which of the following security benefits would be gained by disabling a terminated user account rather than de
Which of the following security benefits would be gained by disabling a terminated user account
rather than deleting it?
Which of the following is MOST likely the reason for this recommendation?
After an assessment, auditors recommended that an application hosting company should contract
with additional data providers for redundant high speed Internet connections. Which of the
following is MOST likely the reason for this recommendation? (Select TWO).
Which of the following security architecture elements also has sniffer functionality?
Which of the following security architecture elements also has sniffer functionality? (Select TWO).
Which of the following is MOST likely the reason for the sub-interfaces?
A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet
interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks.
Which of the following is MOST likely the reason for the sub-interfaces?
Which of the following should be enabled in a laptop’s BIOS prior to full disk encryption?
Which of the following should be enabled in a laptop’s BIOS prior to full disk encryption?
Which of the following BEST meets this need?
Jane, an IT security technician, needs to create a way to secure company mobile devices. Which
of the following BEST meets this need?