which of the following?
Jane has implemented an array of four servers to accomplish one specific task. This is BEST
known as which of the following?
which of the following types of risk mitigation strategies?
After a recent security breach, the network administrator has been tasked to update and backup
all router and switch configurations. The security administrator has been tasked to enforce stricter
security policies. All users were forced to undergo additional user awareness training. All of these
actions are due to which of the following types of risk mitigation strategies?
Which of the following risk mitigation strategies would also need to be implemented to reduce the number of ne
Various network outages have occurred recently due to unapproved changes to network and
security devices. All changes were made using various system credentials. The security analyst
has been tasked to update the security policy. Which of the following risk mitigation strategies
would also need to be implemented to reduce the number of network outages due to unauthorized
changes?
Which of the following security account management techniques should a security analyst implement to prevent s
Which of the following security account management techniques should a security analyst
implement to prevent staff, who has switched company roles, from exceeding privileges?
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following should be recommended?
To ensure compatibility with their flagship product, the security engineer is tasked to recommend
an encryption cipher that will be compatible with the majority of third party software and hardware
vendors. Which of the following should be recommended?
what was discovered?
A security analyst discovered data such as images and word documents hidden within different
types of files. Which of the following cryptographic concepts describes what was discovered?
Which of the following ports should Matt, the security administrator, open on the firewall?
After a new firewall has been installed, devices cannot obtain a new IP address. Which of the
following ports should Matt, the security administrator, open on the firewall?
Which of the following concepts describes the use of a one way transformation in order to validate the integri
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
Which of the following cryptographic products would be used to provide the MOST secure environment for the WLA
A network administrator has been tasked with securing the WLAN. Which of the following
cryptographic products would be used to provide the MOST secure environment for the WLAN?