Which of the following security measures can be put in place to mitigate the issue until a new key card system
Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it
becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters
secure areas. Which of the following security measures can be put in place to mitigate the issue
until a new key card system can be installed?
Which of the following security measures can be put in place to mitigate the issue from occurring in the futur
After running into the data center with a vehicle, attackers were able to enter through the hole in
the building and steal several key servers in the ensuing chaos. Which of the following security
measures can be put in place to mitigate the issue from occurring in the future?
Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following can be used to warn users about the malicious activity?
A CA is compromised and attacks start distributing maliciously signed software updates. Which of
the following can be used to warn users about the malicious activity?
Which of the following can be used to decrypt the information for retrieval?
After encrypting all laptop hard drives, an executive officer’s laptop has trouble booting to the
operating system. Now that it is successfully encrypted the helpdesk cannot retrieve the data.
Which of the following can be used to decrypt the information for retrieval?
Which of the following devices is MOST likely being used when processing the following?
Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY
Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external
party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is
the reason the ABC company’s security administrator is unable to determine the origin of the
attack?
which of the following?
A user attempting to log on to a workstation for the first time is prompted for the following
information before being granted access: username, password, and a four-digit security pin that
was mailed to him during account registration. This is an example of which of the following?
Which of the following should the security administrator use to identify similar malware?
The security administrator is implementing a malware storage system to archive all malware seen
by the company into a central database. The malware must be categorized and stored based on
similarities in the code. Which of the following should the security administrator use to identify
similar malware?
Which of the following was MOST likely compromised?
The security administrator installed a newly generated SSL certificate onto the company web
server. Due to a mis-configuration of the website, a downloadable file containing one of the pieces
of the key was available to the public. It was verified that the disclosure did not require a reissue of
the certificate. Which of the following was MOST likely compromised?