Which of the following would BEST prevent this behavior?
A system administrator has noticed that users change their password many times to cycle back to
the original password when their passwords expire. Which of the following would BEST prevent
this behavior?
Which of the following algorithms with transport encryption would be implemented to provide the MOST secure we
Recent data loss on financial servers due to security breaches forced the system administrator to
harden their systems. Which of the following algorithms with transport encryption would be
implemented to provide the MOST secure web connections to manage and access these servers?
Which of the following would BEST mitigate this risk?
The systems administrator notices that many employees are using passwords that can be easily
guessed or are susceptible to brute force attacks. Which of the following would BEST mitigate this
risk?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following explains the difference between these two types of malware?
Pete, a security analyst, has been tasked with explaining the different types of malware to his
colleagues. The two malware types that the group seems to be most interested in are botnets and
viruses. Which of the following explains the difference between these two types of malware?
Which of the following types of authentication is being described?
A company requires that a user’s credentials include providing something they know and
something they are in order to gain access to the network. Which of the following types of
authentication is being described?
Which of the following would accomplish this?
A company wants to ensure that all credentials for various systems are saved within a central
database so that users only have to login once for access to all systems. Which of the following
would accomplish this?
Which of the following account management techniques should be undertaken regularly to ensure least privilege
A security analyst implemented group-based privileges within the company active directory. Which
of the following account management techniques should be undertaken regularly to ensure least
privilege principles?
Which of the following attacks is occurring?
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs
show repeated connection attempts from the following IP:
10.10.3.23
These attempts are overloading the server to the point that it cannot respond to traffic. Which of
the following attacks is occurring?
Which of the following ports may have been closed to cause this issue?
A technician has just installed a new firewall onto the network. Users are reporting that they
cannot reach any website. Upon further investigation, the technician determines that websites can
be reached by entering their IP addresses. Which of the following ports may have been closed to
cause this issue?