Which of the following controls should be used together to prevent this from occurring?
A recent audit has discovered that at the time of password expiration clients are able to
recycle the previous credentials for authentication. Which of the following controls should be
used together to prevent this from occurring? (Select TWO).
Which of the following authentication services is being used?
A system administrator is configuring UNIX accounts to authenticate against an external
server. The configuration file asks for the following information DC=ServerName and
DC=COM. Which of the following authentication services is being used?
which of the following?
In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following?
Which of the following network design elements allows for many internal devices to share one public IP address
Which of the following network design elements allows for many internal devices to share
one public IP address?
Which of the following components of an all-in-one security appliance would MOST likely be configured in order
Which of the following components of an all-in-one security appliance would MOST likely be
configured in order to restrict access to peer-to-peer file sharing websites?
which of the following techniques supports availability?
When considering a vendor-specific vulnerability in critical industrial control systems which of
the following techniques supports availability?
which of the following information is MOST likely required?
During the information gathering stage of a deploying role-based access control model,
which of the following information is MOST likely required?
Which of the following is the BEST method to prevent such activities in the future?
The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a
database administrator performing several other job functions within the company. Which of
the following is the BEST method to prevent such activities in the future?
Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by
email, but she is worried about the confidentiality of the information. Which of the following
will accomplish this task securely?
Which of the following would be the BEST technology control to use in this scenario?
A company is trying to limit the risk associated with the use of unapproved USB devices to
copy documents. Which of the following would be the BEST technology control to use in this
scenario?