Which of the following could have mitigated this event?
Ann, the security administrator, received a report from the security technician, that an
unauthorized new user account was added to the server over two weeks ago. Which of the
following could have mitigated this event?
Which of the following would provide the BEST level of protection?
Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the
following would provide the BEST level of protection?
Which of the following ports should be opened on a firewall to allow for NetBIOS communication?
Which of the following ports should be opened on a firewall to allow for NetBIOS communication?
(Select TWO).
Which of the following controls will BEST protect the kiosk from general public users making system changes?
Jane, an IT administrator, is implementing security controls on a Microsoft Windows based kiosk
used at a bank branch. This kiosk is used by the public for Internet banking. Which of the following
controls will BEST protect the kiosk from general public users making system changes?
Which of the following would BEST address this?
Joe, the systems administrator, is setting up a wireless network for his team’s laptops only and
needs to prevent other employees from accessing it. Which of the following would BEST address
this?
Which of the following is being described?
After Ann, a user, logs into her banking websites she has access to her financial institution
mortgage, credit card, and brokerage websites as well. Which of the following is being described?
Which of the following is Sara’s GREATEST concern?
Sara, the Chief Information Officer (CIO), has tasked the IT department with redesigning the
network to rely less on perimeter firewalls, to implement a standard operating environment for
client devices, and to disallow personally managed devices on the network. Which of the following
is Sara’s GREATEST concern?
Which of the following means of wireless authentication is easily vulnerable to spoofing?
Which of the following means of wireless authentication is easily vulnerable to spoofing?
Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot
Which of the following data loss prevention strategies mitigates the risk of replacing hard drives
that cannot be sanitized?
Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile dev
Which of the following is a way to implement a technical control to mitigate data loss in case of a
mobile device theft?