which of the following risk mitigation strategies?
A security administrator has been tasked to ensure access to all network equipment is controlled
by a central server such as TACACS+. This type of implementation supports which of the following
risk mitigation strategies?
which of the following should be used to decrypt data at company B?
Company A sends a PGP encrypted file to company B. If company A used company B’s public key
to encrypt the file, which of the following should be used to decrypt data at company B?
Which of the following types of authentication solutions use tickets to provide access to various resources fr
Which of the following types of authentication solutions use tickets to provide access to various
resources from a central location?
Which of the following would offer the ability to expand while keeping their current data center operated by i
A corporation is looking to expand their data center but has run out of physical space in which to
store hardware. Which of the following would offer the ability to expand while keeping their current
data center operated by internal staff?
Which of the following has the attacker created?
After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following has the attacker created?
Which of the following concepts is enforced by certifying that email communications have been sent by who the
Which of the following concepts is enforced by certifying that email communications have been
sent by who the message says it has been sent by?
which of the following attacks is underway?
After a recent breach, the security administrator performs a wireless survey of the corporate
network. The security administrator notices a problem with the following output:
MACSSIDENCRYPTIONPOWERBEACONS
00:10:A1:36:12:CCMYCORPWPA2 CCMP601202
00:10:A1:49:FC:37MYCORPWPA2 CCMP709102
FB:90:11:42:FA:99MYCORPWPA2 CCMP403031
00:10:A1:AA:BB:CCMYCORPWPA2 CCMP552021
00:10:A1:FA:B1:07MYCORPWPA2 CCMP306044
Given that the corporate wireless network has been standardized, which of the following attacks is
underway?
Input validation is an important security defense because it:
Input validation is an important security defense because it:
Which of the following is the MOST important activity that should be considered?
In order to maintain oversight of a third party service provider, the company is going to implement
a Governance, Risk, and Compliance (GRC) system. This system is promising to provide overall
security posture coverage. Which of the following is the MOST important activity that should be
considered?
Which of the following should be performed to help avoid this scenario?
A recent audit of a company’s identity management system shows that 30% of active accounts
belong to people no longer with the firm. Which of the following should be performed to help avoid
this scenario? (Select TWO).