Which of the following is MOST likely being used?
While an Internet café a malicious user is causing all surrounding wireless connected devices to
have intermittent and unstable connections to the access point. Which of the following is MOST
likely being used?
Which of the following is the BEST technical control that could be implemented to reduce the amount of easily
A password audit has revealed that a significant percentage if end-users have passwords that are
easily cracked. Which of the following is the BEST technical control that could be implemented to
reduce the amount of easily “crackable” passwords in use?
Which of the following is the MOST secure combination to implement to meet this goal?
While working on a new project a security administrator wants to verify the integrity of the data in
the organizations archive library. Which of the following is the MOST secure combination to
implement to meet this goal? (Select TWO)
Which of the following should be performed after the server has been restored?
A company has been attacked and their website has been altered to display false information. The
security administrator disables the web server service before restoring the website from backup.
An audit was performed on the server and no other data was altered. Which of the following
should be performed after the server has been restored?
Which of the following tools could BEST be used to determine how the employee is connecting to the reverse pro
A security administrator suspects that an employee in the IT department is utilizing a reverse
proxy to bypass the company’s content filter and browse unapproved and non-work related sites
while at work. Which of the following tools could BEST be used to determine how the employee is
connecting to the reverse proxy?
Which of the following protocols should he secure?
Joe, a company’s network engineer, is concerned that protocols operating at the application layer
of the OSI model are vulnerable to exploitation on the network. Which of the following protocols
should he secure?
Which of the following is preventing the users from accessing the SSH server?
Ann a security technician receives a report from a user that is unable to access an offsite SSN
server. Ann checks the firewall and sees the following rules:
Allow TCP 80
Allow TCP 443
Deny TCP 23
Deny TCP 20
Deny TCP 21
Which of the following is preventing the users from accessing the SSH server?
Which of the following control methods is the administrator using by configuring this policy?
An administrator uses a server with a trusted OS and is configuring an application to go into
production tomorrow, In order to make a new application work properly, the administrator creates
a new policy that labels the application and assigns it a security context within the trusted OS.
Which of the following control methods is the administrator using by configuring this policy?
what should be done?
A security administrator has been tasked with assisting in the forensic investigation of an incident
relating to employee misconduct. The employee’s supervisor believes evidence of this misconduct
can be found on the employee’s assigned workstation. Which of the following choices BEST
describes what should be done? (Select TWO)
Which of the following is one way to prevent this type of attack?
Joe a web developer wants to make sure his application is not susceptible to cross-site request
forgery attacks. Which of the following is one way to prevent this type of attack?