Which of the following security concepts can prevent a user from logging on from home during the weekends?
Which of the following security concepts can prevent a user from logging on from home during the
weekends?
Which of the following is being used?
An administrator configures all wireless access points to make use of a new network certificate
authority. Which of the following is being used?
Which of the following would provide the STRONGEST encryption?
Which of the following would provide the STRONGEST encryption?
Which of the following was the colleague performing?
A security analyst noticed a colleague typing the following command:
‘Telnet some-host 443’
Which of the following was the colleague performing?
Which of the following has MOST likely been installed on the server?
During a server audit, a security administrator does not notice abnormal activity. However, a
network security analyst notices connections to unauthorized ports from outside the corporate
network. Using specialized tools, the network security analyst also notices hidden processes
running. Which of the following has MOST likely been installed on the server?
Which of the following is the administrator MOST concerned with?
A security administrator wants to ensure that the message the administrator sends out to their
Chief Financial Officer (CFO) does not get changed in route. Which of the following is the
administrator MOST concerned with?
Which of the following authentication services would this use this port by default?
An information bank has been established to store contacts, phone numbers and other records.
An application running on UNIX would like to connect to this index server using port 88. Which of
the following authentication services would this use this port by default?
Which of the following can be performed when an element of the company policy cannot be enforced by technical
Which of the following can be performed when an element of the company policy cannot be
enforced by technical means?
Which of the following is the security administrator practicing in this example?
A database administrator contacts a security administrator to request firewall changes for a
connection to a new internal application. The security administrator notices that the new
application uses a port typically monopolized by a virus. The security administrator denies the
request and suggests a new port or service be used to complete the application’s task. Which of
the following is the security administrator practicing in this example?
which of the following types of attacks?
Timestamps and sequence numbers act as countermeasures against which of the following types
of attacks?