which of the following attacks?
A network analyst received a number of reports that impersonation was taking place on the
network. Session tokens were deployed to mitigate this issue and defend against which of the
following attacks?
Which of the following controls would prevent an employee from emailing unencrypted information to their perso
Which of the following controls would prevent an employee from emailing unencrypted information
to their personal email account over the corporate network?
which rates the ability of a system to correctly authenticate an authorized user?
Which of the following is a measure of biometrics performance which rates the ability of a system
to correctly authenticate an authorized user?
How many authentication factors are in use by the VPN system?
A company with a US-based sales force has requested that the VPN system be configured to
authenticate the sales team based on their username, password and a client side certificate.
Additionally, the security administrator has restricted the VPN to only allow authentication from the
US territory. How many authentication factors are in use by the VPN system?
Which of the following should the company implement to enforce software digital rights?
A software development company wants to implement a digital rights management solution to
protect its intellectual property. Which of the following should the company implement to enforce
software digital rights?
Which of the following can be inferred of a firewall that is configured ONLY with the following ACL?
Users are unable to connect to the web server at IP 192.168.0.20. Which of the following can be
inferred of a firewall that is configured ONLY with the following ACL?
PERMIT TCP ANY HOST 192.168.0.10 EQ 80
PERMIT TCP ANY HOST 192.168.0.10 EQ 443
Which of the following security awareness training is BEST suited for data owners who are concerned with prote
Which of the following security awareness training is BEST suited for data owners who are
concerned with protecting the confidentiality of their data?
Which of the following can the security administrator implement to mitigate the risk of an online password att
A security administrator is concerned about the strength of user’s passwords. The company does
not want to implement a password complexity policy. Which of the following can the security
administrator implement to mitigate the risk of an online password attack against users with weak
passwords?
Which of the following types of authentication is being utilized here?
A company has purchased an application that integrates into their enterprise user directory for
account authentication. Users are still prompted to type in their usernames and passwords. Which
of the following types of authentication is being utilized here?
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues?
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit
issues? (Select TWO).