which of the following threats?
Full disk encryption is MOST effective against which of the following threats?
Which of the following may cause Jane, the security administrator, to seek an ACL work around?
Which of the following may cause Jane, the security administrator, to seek an ACL work around?
which of the following?
In order to use a two-way trust model the security administrator MUST implement which of the
following?
Which of the following would a security administrator use to verify the integrity of a file?
Which of the following would a security administrator use to verify the integrity of a file?
Which of the following is a best practice when securing a switch from physical access?
Which of the following is a best practice when securing a switch from physical access?
Which of the following is a best practice when securing a switch from physical access?
Which of the following is a best practice when securing a switch from physical access?
Which of the following will allow for faster imaging to a second hard drive?
A security administrator needs to image a large hard drive for forensic analysis. Which of the
following will allow for faster imaging to a second hard drive?
Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security
gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the
tethered connection and corporate data is stolen. Which of the following would BEST prevent this
from occurring again?
Which of the following can be implemented if a security administrator wants only certain devices connecting to
Which of the following can be implemented if a security administrator wants only certain devices
connecting to the wireless network?
Which of the following malware types typically allows an attacker to monitor a user’s computer, is character
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?