Which of the following should the administrator deploy?
A security administrator wants to block unauthorized access to a web server using a locally
installed software program. Which of the following should the administrator deploy?
Which of the following is this known as?
A network administrator has identified port 21 being open and the lack of an IDS as a potential risk
to the company. Due to budget constraints, FTP is the only option that the company can is to
transfer data and network equipment cannot be purchased. Which of the following is this known
as?
Which of the following logs should the administrator search for information regarding the breach?
A security administrator is investigating a recent server breach. The breach occurred as a result of
a zero-day attack against a user program running on the server. Which of the following logs should
the administrator search for information regarding the breach?
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
A user attempts to install new and relatively unknown software recommended by a colleague. The
user is unable to install the program, despite having successfully installed other programs
previously. Which of the following is MOST likely the cause for the user’s inability to complete the
installation?
Which of the following authentication services is being deployed by the administrator?
A system administrator is configuring shared secrets on servers and clients. Which of the following
authentication services is being deployed by the administrator? (Select two.)
Which of the following default ports on the firewall must the security engineer open to accomplish this task?
The finance department just procured a software application that needs to communicate back to
the vendor server via SSL. Which of the following default ports on the firewall must the security
engineer open to accomplish this task?
Which of the following did the organization fail to properly implement?
After an audit, it was discovered that an account was not disabled in a timely manner after an
employee has departed from the organization. Which of the following did the organization fail to
properly implement?
Which of the following BEST would protect the building from this threat?
The Chief Security Officer (CSO) for a datacenter in a hostile environment is concerned about
protecting the facility from car bomb attacks. Which of the following BEST would protect the
building from this threat? (Select two.)
Which of the following poses the greatest risk with this integration?
Users can authenticate to a company’s web applications using their credentials form a popular
social media site. Which of the following poses the greatest risk with this integration?
Which of the following provides the BEST solution?
A corporation has experienced several media leaks of proprietary data on various web forums.
The posts were made during business hours and it is believed that the culprit is posting during
work hours from a corporate machine. The Chief Information Officer (CIO) wants to scan internet
traffic and keep records for later use in legal proceedings once the culprit is found. Which of the
following provides the BEST solution?