Which of the following assessment tools can be used to determine if there is an issue with the file server?
Several users report to the administrator that they are having issues downloading files from the file
server. Which of the following assessment tools can be used to determine if there is an issue with
the file server?
Which of the following environmental controls was MOST likely overlooked during installation?
When a new network drop was installed, the cable was run across several fluorescent lights. The
users of the new network drop experience intermittent connectivity. Which of the following
environmental controls was MOST likely overlooked during installation?
Which of the following is being used?
An administrator configures all wireless access points to make use of a new network certificate
authority. Which of the following is being used?
Which of the following was the colleague performing?
A security analyst noticed a colleague typing the following command:
‘Telnet some-host 443’
Which of the following was the colleague performing?
Which of the following authentication services would this use this port by default?
An information bank has been established to store contacts, phone numbers and other records.
An application running on UNIX would like to connect to this index server using port 88. Which of
the following authentication services would this use this port by default?
Which of the following is the security administrator practicing in this example?
A database administrator contacts a security administrator to request firewall changes for a
connection to a new internal application. The security administrator notices that the new
application uses a port typically monopolized by a virus. The security administrator denies the
request and suggests a new port or service be used to complete the application’s task. Which of
the following is the security administrator practicing in this example?
Which of the following BEST describes a SQL Injection attack?
Which of the following BEST describes a SQL Injection attack?
which of the following items?
Digital signatures are used for ensuring which of the following items? (Select TWO).
Which of the following can be done to mitigate this?
Matt, an administrator, is concerned about the wireless network being discovered by war driving.
Which of the following can be done to mitigate this?
Which of the following would be the BEST process to verify the backup datacenter is prepared for such a scenar
A company wants to ensure that its hot site is prepared and functioning. Which of the following
would be the BEST process to verify the backup datacenter is prepared for such a scenario?