Which of the following policies would prevent contractors from having access to systems in the event a contrac
ABC company has a lot of contractors working for them. The provisioning team does not always
get notified that a contractor has left the company. Which of the following policies would prevent
contractors from having access to systems in the event a contractor has left?
which of the following?
The practice of marking open wireless access points is called which of the following?
which of the following?
Multi-tenancy is a concept found in which of the following?
which boundary checking is not performed?
Which of the following is a common coding error in which boundary checking is not performed?
While previously recommended as a security measure, disabling SSID broadcast is not effective against most att
While previously recommended as a security measure, disabling SSID broadcast is not effective
against most attackers because network SSIDs are:
One of the most consistently reported software security vulnerabilities that leads to major exploits is:
One of the most consistently reported software security vulnerabilities that leads to major exploits
is:
which of the following?
Public key certificates and keys that are compromised or were issued fraudulently are listed on
which of the following?
which of the following?
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device
is physically stolen is to implement which of the following?
Which of the following would be used to validate programs prior to installing them?
Users report that after downloading several applications, their systems’ performance has
noticeably decreased. Which of the following would be used to validate programs prior to installing
them?
Which of the following describes how the employee is leaking these secrets?
Ann, a security analyst, has been notified that trade secrets are being leaked from one of the
executives in the corporation. When reviewing this executive’s laptop she notices several pictures
of the employee’s pets are on the hard drive and on a cloud storage network. When Ann hashes
the images on the hard drive against the hashes on the cloud network they do not match. Which of
the following describes how the employee is leaking these secrets?