Which of the following controls can be used to prevent the disclosure of sensitive information stored on a mob
Which of the following controls can be used to prevent the disclosure of sensitive information
stored on a mobile device’s removable media in the event that the device is lost or stolen?
Which of the following should be performed to increase the availability of IP telephony by prioritizing traffi
Which of the following should be performed to increase the availability of IP telephony by
prioritizing traffic?
Which of the following protocols would have been affected by this?
A malicious program modified entries in the LMHOSTS file of an infected system. Which of the
following protocols would have been affected by this?
Which of the following protocols would have been affected by this?
A malicious program modified entries in the LMHOSTS file of an infected system. Which of the
following protocols would have been affected by this?
Which of the following attacks MOST likely occurred?
A victim is logged onto a popular home router forum site in order to troubleshoot some router
configuration issues. The router is a fairly standard configuration and has an IP address of
192.168.1.1. The victim is logged into their router administrative interface in one tab and clicks a
forum link in another tab. Due to clicking the forum link, the home router reboots. Which of the
following attacks MOST likely occurred?
Which of the following assets is MOST likely considered for DLP?
Which of the following assets is MOST likely considered for DLP?
which of the following when sending an email to a recipient for the first time?
In order to securely communicate using PGP, the sender of an email must do which of the
following when sending an email to a recipient for the first time?
Which of the following security controls is the hacker exploiting?
A hacker has discovered a simple way to disrupt business for the day in a small company which
relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely
working staff access to company systems with a script. Which of the following security controls is
the hacker exploiting?
Which of the following will MOST likely be performed?
A security specialist has been asked to evaluate a corporate network by performing a vulnerability
assessment. Which of the following will MOST likely be performed?
Which of the following should the technician do to gather information about the configuration of the wireless
A security technician is attempting to access a wireless network protected with WEP. The
technician does not know any information about the network. Which of the following should the
technician do to gather information about the configuration of the wireless network?