To identify any such users, the security administrator could:
Based on information leaked to industry websites, business management is concerned that
unauthorized employees are accessing critical project information for a major, well-known new
product. To identify any such users, the security administrator could:
The security administrator is determining the:
A set of standardized system images with a pre-defined set of applications is used to build enduser workstations. The security administrator has scanned every workstation to create a current
inventory of all applications that are installed on active workstations and is documenting which
applications are out-of-date and could be exploited. The security administrator is determining the:
Which of the following should be adjusted to mitigate this risk?
A perimeter survey finds that the wireless network within a facility is easily reachable outside of the
physical perimeter. Which of the following should be adjusted to mitigate this risk?
Which of the following would verify that a threat does exist and security controls can easily be bypassed with
Which of the following would verify that a threat does exist and security controls can easily be
bypassed without actively testing an application?
which of the following?
Connections using point-to-point protocol authenticate using which of the following? (Select TWO).
Which of the following will help prevent smurf attacks?
Which of the following will help prevent smurf attacks?
An advantage of virtualizing servers, databases, and office applications is:
An advantage of virtualizing servers, databases, and office applications is:
A major security risk with co-mingling of hosts with different security requirements is:
A major security risk with co-mingling of hosts with different security requirements is:
Which of the following attacks targets high level executives to gain company information?
Which of the following attacks targets high level executives to gain company information?
Which of the following can be used as an equipment theft deterrent?
Which of the following can be used as an equipment theft deterrent?