Which of the following allows for greater secrecy about this network during this initial phase of implementati
A security architect wishes to implement a wireless network with connectivity to the company’s
internal network. Before they inform all employees that this network is being put in place, the
architect wants to roll it out to a small test segment. Which of the following allows for greater
secrecy about this network during this initial phase of implementation?
which of the following?
Digital certificates can be used to ensure which of the following? (Select TWO).
Which of the following BEST describes the service that should be implemented to meet these requirements?
A network administrator is looking for a way to automatically update company browsers so they
import a list of root certificates from an online source. This online source will then be responsible
for tracking which certificates are to be trusted or not trusted. Which of the following BEST
describes the service that should be implemented to meet these requirements?
which of the following?
A security administrator has concerns about new types of media which allow for the mass
distribution of personal comments to a select group of people. To mitigate the risks involved with
this media, employees should receive training on which of the following?
Which of the following processes could MOST effectively mitigate these risks?
A network administrator is responsible for securing applications against external attacks. Every
month, the underlying operating system is updated. There is no process in place for other software
updates. Which of the following processes could MOST effectively mitigate these risks?
Which of the following practices are they following to ensure application integrity?
The software developer is responsible for writing the code and promoting from the development
network to the quality network. The network administrator is responsible for promoting code to the
production application servers. Which of the following practices are they following to ensure
application integrity?
Which of the following practices is being implemented?
A software developer is responsible for writing the code on an accounting application. Another
software developer is responsible for developing code on a system in human resources. Once a
year they have to switch roles for several weeks. Which of the following practices is being
implemented?
which of the following types of testing?
A quality assurance analyst is reviewing a new software product for security, and has complete
access to the code and data structures used by the developers. This is an example of which of the
following types of testing?
which of the following types of testing?
The security consultant is assigned to test a client’s new software for security, after logs show
targeted attacks from the Internet. To determine the weaknesses, the consultant has no access to
the application program interfaces, code, or data structures. This is an example of which of the
following types of testing?
Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile de
Which of the following types of cryptography should be used when minimal overhead is necessary
for a mobile device?