Which credentialtype authentication method BEST fits these requirements?
Matt, a systems security engineer, is determining which credential-type authentication to use
within a planned 802.1x deployment. He is looking for a method that does not require a client
certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credentialtype authentication method BEST fits these requirements?
what the security company might do during a black box test?
Matt, the Chief Information Security Officer (CISO), tells the network administrator that a security
company has been hired to perform a penetration test against his network. The security company
asks Matt which type of testing would be most beneficial for him. Which of the following BEST
describes what the security company might do during a black box test?
Which of the following concerns should Jane, the IT security manager, ensure are under control?
Corporate IM presents multiple concerns to enterprise IT. Which of the following concerns should
Jane, the IT security manager, ensure are under control? (Select THREE).
The use of social networking sites introduces the risk of:
The use of social networking sites introduces the risk of:
which of the following attacks?
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the
following attacks? (Select TWO).
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network b
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company
network by using a former employee’s credential?
Which of the following would need to be in place in case something happens to Pete?
Pete, the Chief Executive Officer (CEO) of a company, has increased his travel plans for the next
two years to improve business relations. Which of the following would need to be in place in case
something happens to Pete?
which of the following should be implemented?
In order to prevent and detect fraud, which of the following should be implemented?
Which of the following BEST represents the goal of a vulnerability assessment?
Which of the following BEST represents the goal of a vulnerability assessment?
The administrator suspects that:
An administrator notices an unusual spike in network traffic from many sources. The administrator
suspects that: