Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?
Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?
The security administrator is determining the:
A set of standardized system images with a pre-defined set of applications is used to build enduser workstations. The security administrator has scanned every workstation to create a current
inventory of all applications that are installed on active workstations and is documenting which
applications are out-of-date and could be exploited. The security administrator is determining the:
Which of the following should be adjusted to mitigate this risk?
A perimeter survey finds that the wireless network within a facility is easily reachable outside of the
physical perimeter. Which of the following should be adjusted to mitigate this risk?
Which of the following practices is used to mitigate a known security vulnerability?
Which of the following practices is used to mitigate a known security vulnerability?
Which of the following would verify that a threat does exist and security controls can easily be bypassed with
Which of the following would verify that a threat does exist and security controls can easily be
bypassed without actively testing an application?
Which of the following would Jane, an administrator, use to detect an unknown security vulnerability?
Which of the following would Jane, an administrator, use to detect an unknown security
vulnerability?
which of the following?
Connections using point-to-point protocol authenticate using which of the following? (Select TWO).
which of the following would Matt, a security administrator, focus on to determine who affirms the identity of
When reviewing a digital certificate for accuracy, which of the following would Matt, a security
administrator, focus on to determine who affirms the identity of the certificate owner?
Which of the following will help prevent smurf attacks?
Which of the following will help prevent smurf attacks?
An advantage of virtualizing servers, databases, and office applications is:
An advantage of virtualizing servers, databases, and office applications is: