Which of the following attacks occurred LAST?
Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to
the building. Sara then calls the helpdesk and informs them that their PIN no longer works and
would like to change it. Which of the following attacks occurred LAST?
Which of the following BEST describes these results?
Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for
multicast packets from the switches on the network. After investigation, she discovers that this is
normal activity for her network. Which of the following BEST describes these results?
Which of the following descriptions fits this new implementation?
A company replaces a number of devices with a mobile appliance, combining several functions.
Which of the following descriptions fits this new implementation? (Select TWO).
Which of the following BEST describes this statement?
Joe, a security analyst, asks each employee of an organization to sign a statement saying that
they understand how their activities may be monitored. Which of the following BEST describes this
statement? (Select TWO).
A process in which the functionality of an application is tested without any knowledge of the internal mechani
A process in which the functionality of an application is tested without any knowledge of the
internal mechanisms of the application is known as:
Which of the following risks could IT management be mitigating by removing an all-in-one device?
Which of the following risks could IT management be mitigating by removing an all-in-one device?
Which of the following tools would allow Ann, the security administrator, to be able to BEST quantify all traf
Which of the following tools would allow Ann, the security administrator, to be able to BEST
quantify all traffic on her network?
Which of the following could a security administrator implement to mitigate the risk of tailgating for a large
Which of the following could a security administrator implement to mitigate the risk of tailgating for
a large organization?
Which of the following should an administrator implement to research current attack methodologies?
Which of the following should an administrator implement to research current attack
methodologies?
Which of the following concepts defines the requirement for data availability?
Which of the following concepts defines the requirement for data availability?