Which of the following technologies provide the MOST complete protection?
A security engineer is tasked with encrypting corporate email. Which of the following technologies
provide the MOST complete protection? (Select TWO)
Which of the following is the GREATEST security concern of allowing employees to bring in their personally own
Which of the following is the GREATEST security concern of allowing employees to bring in their
personally owned tablets and connecting to the corporate network?
which of the following phases of incident response?
Searching for systems infected with malware is considered to be which of the following phases of
incident response?
Which of the following services could be run on the VPN concentrator to perform this authentication?
A technician has deployed a new VPN concentrator. The device needs to authenticate users
based on a backend directory service. Which of the following services could be run on the VPN
concentrator to perform this authentication?
Which of the following can BEST reduce the likelihood of this incident occurring again?
A webpage displays a potentially offensive advertisement on a computer. A customer walking by
notices the displayed advertisement and files complaint. Which of the following can BEST reduce
the likelihood of this incident occurring again?
Which of the following is an attack designed to activate based on date?
Which of the following is an attack designed to activate based on date?
Which of the following techniques is MOST likely to gather this type of data?
A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7
Which of the following techniques is MOST likely to gather this type of data?
Which of the following security controls would be MOST appropriate?
A company wants to prevent unauthorized access to its secure data center. Which of the following
security controls would be MOST appropriate?
Which of the following password parameters is MOST likely misconfigured?
Company policy requires employees to change their passwords every 60 days. The security
manager has verified all systems are configured to expire passwords after 60 days. Despite the
policy and technical configuration, weekly password audits suggest that some employees have
had the same weak passwords in place longer than 60 days. Which of the following password
parameters is MOST likely misconfigured?
Which of the following algorithms should the administrator select?
An administrator would like to utilize encryption that has comparable speed and strength to the
AES cipher without using AES itself. The cipher should be able to operate in the same modes as
AES and utilize the same minimum bit strength. Which of the following algorithms should the
administrator select?