Which of the following would an attacker use to penetrate and capture additional traffic prior to performing a
Which of the following would an attacker use to penetrate and capture additional traffic prior to
performing an IV attack?
Which of the following would BEST address this concern?
An administrator has concerns regarding the company’s server rooms Proximity badge readers
were installed, but it is discovered this is not preventing unapproved personnel from tailgating into
these area. Which of the following would BEST address this concern?
Which of the following would be a reason for developers to utilize an AES cipher in CCM mode (Counter with Cha
Which of the following would be a reason for developers to utilize an AES cipher in CCM mode
(Counter with Chain Block Message Authentication Code)?
Which of the following should the administrator do?
One of the findings of risk assessment is that many of the servers on the data center subnet
contain data that is in scope for PCI compliance, Everyone in the company has access to these
servers, regardless of their job function. Which of the following should the administrator do?
Which of the following could have prevented this situation from occurring?
Various employees have lost valuable customer data due to hard drives failing in company
provided laptops. It has been discovered that the hard drives used in one model of laptops
provided by the company has been recalled by the manufactory, The help desk is only able to
replace the hard drives after they fail because there is no centralized records of the model of
laptop given to each specific user. Which of the following could have prevented this situation from
occurring?
which of the following attacks?
Attempting to inject 50 alphanumeric key strokes including spaces into an application input field
that only expects four alpha characters in considered which of the following attacks?
Which of the following would accomplish this requirement?
An organization is required to log all user internet activity. Which of the following would accomplish
this requirement?
Which of the following should be used?
An agent wants to create fast and efficient cryptographic keys to use with Diffie-Hellman without
using prime numbers to generate the keys. Which of the following should be used?
Which of the following is Joe attempting to prevent?
Joe an application developer is building an external facing marketing site. There is an area on the
page where clients may submit their feedback to articles that are posted. Joe filters client-side
JAVA input. Which of the following is Joe attempting to prevent?
Which of the following could BEST prevent a situation like this form occurring again?
A video surveillance audit recently uncovered that an employee plugged in a personal laptop and
used the corporate network to browse inappropriate and potentially malicious websites after office
hours. Which of the following could BEST prevent a situation like this form occurring again?