Which of the following should be enabled in IPSec to allow this?
A security administrator wishes to protect session leys should a private key become discovered.
Which of the following should be enabled in IPSec to allow this?
which of the following stages of the Incident Handling Response?
A workstation is exhibiting symptoms of malware and the network security analyst has decided to
remove the system from the network. This represents which of the following stages of the Incident
Handling Response?
Which of the following would provide the MOST objective results when performing penetration testing for an org
Which of the following would provide the MOST objective results when performing penetration
testing for an organization?
Which of the following would meet this goal?
An administrator would like users to authenticate to the network using only UDP protocols. Which
of the following would meet this goal?
When employing PKI to send signed and encrypted data the individual sending the data must have: (Select TWO)
When employing PKI to send signed and encrypted data the individual sending the data must
have: (Select TWO)
Which of the following would provide the BEST environment for performing this testing?
Joe a technician is tasked with finding a way to test operating system patches for a wide variety of
servers before deployment to the production environment while utilizing a limited amount of
hardware resources. Which of the following would provide the BEST environment for performing
this testing?
Which of the following is the BEST solution?
A custom PKI application downloads a certificate revocation list (CRL) once per day. Management
requests the list be checked more frequently. Which of the following is the BEST solution?
Which of the following would achieve this?
A security technician wants to improve the strength of a weak key by making it more secure
against brute force attacks. Which of the following would achieve this?
Which of the following principles is potentially being violated?
Joe uses his badge to enter the server room, Ann follows Joe entering without using her badge. It
is later discovered that Ann used a USB drive to remove confidential data from a server. Which of
the following principles is potentially being violated? (Select TWO)
Which of the following risk mitigation strategies should she implement in her department?
Ann the IT director wants to ensure that as hoc changes are not making their way to the
production applications. Which of the following risk mitigation strategies should she implement in
her department?