Which of the following can help determine where the attack originated from?
Joe, the security administrator, has determined that one of his web servers is under attack. Which
of the following can help determine where the attack originated from?
Which of the following should Joe take into consideration?
Joe, the system administrator, is performing an overnight system refresh of hundreds of user
computers. The refresh has a strict timeframe and must have zero downtime during business
hours. Which of the following should Joe take into consideration?
Which of the following is MOST likely accomplished by the program’s behavior?
A program displays:
ERROR: this program has caught an exception and will now terminate.
Which of the following is MOST likely accomplished by the program’s behavior?
Which of the following should be implemented?
A security administrator wants to deploy a physical security control to limit an individual’s access
into a sensitive area. Which of the following should be implemented?
which of the following?
A network administrator uses an RFID card to enter the datacenter, a key to open the server rack,
and a username and password to logon to a server. These are examples of which of the
following?
Which of the following results in datacenters with failed humidity controls?
Which of the following results in datacenters with failed humidity controls? (Select TWO).
Which of the following database designs provides the BEST security for the online store?
An online store wants to protect user credentials and credit card information so that customers can
store their credit card information and use their card for multiple separate transactions. Which of
the following database designs provides the BEST security for the online store?
Which of the following is BEST suited when assigning user rights to individuals in the sales department?
A network administrator is configuring access control for the sales department which has high
employee turnover. Which of the following is BEST suited when assigning user rights to individuals
in the sales department?
Which of the following additional policies should be implemented based on the tool’s output?
A security administrator is reviewing the below output from a password auditing tool:
P@ss.
@pW1.
S3cU4
Which of the following additional policies should be implemented based on the tool’s output?
Which of the following attacks allows for this impersonation?
Joe, a user, in a coffee shop is checking his email over a wireless network. An attacker records
the temporary credentials being passed to Joe’s browser. The attacker later uses the credentials
to impersonate Joe and creates SPAM messages. Which of the following attacks allows for this
impersonation?