Which of the following would allow users from outside of an organization to have access to internal resources?
Which of the following would allow users from outside of an organization to have access to internal
resources?
Which of the following is BEST described by a scenario where management chooses not to implement a security co
Which of the following is BEST described by a scenario where management chooses not to
implement a security control for a given risk?
Which of the following ports is used for TELNET by default?
Which of the following ports is used for TELNET by default?
which of the following types of encryption should be chosen?
When confidentiality is the primary concern which of the following types of encryption should be
chosen?
Which of the following is the BEST way to run the malware scanner?
A Windows- based computer is infected with malware and is running too slowly to boot and run a
malware scanner. Which of the following is the BEST way to run the malware scanner?
Which of the following would be MOST appropriate when configuring security on her laptop?
Ann a member of the Sales Department has been issued a company-owned laptop for use when
traveling to remote sites. Which of the following would be MOST appropriate when configuring
security on her laptop?
Which of the following application security controls has the technician attempted?
A security technician has removed the sample configuration files from a database server. Which of
the following application security controls has the technician attempted?
Which of the following controls meets this goal?
Data confidentiality must be enforces on a secure database. Which of the following controls meets
this goal? (Select TWO)
Which of the following types of controls was being used?
A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at
the site do not record any footage. Which of the following types of controls was being used?
which of the following?
A network security administrator is trying to determine how an attacker gained access to the
corporate wireless network. The network is configured with SSID broadcast disabled. The senior
network administrator explains that this configuration setting would only have determined an
unsophisticated attacker because of which of the following?