Which of the following choices BEST mitigates the security risk of public web surfing?
By hijacking unencrypted cookies an application allows an attacker to take over existing web
sessions that do not use SSL or end to end encryption. Which of the following choices BEST
mitigates the security risk of public web surfing? (Select TWO)
Which of the following encryptions needs BOTH of these needs?
The security administration team at a company has been tasked with implementing a data-at-rest
solution for its company storage. Due to the large amount of storage the Chief Information Officer
(CISO) decides that a 128-bit cipher is needed but the CISO also does not want to degrade
system performance any more than necessary. Which of the following encryptions needs BOTH of
these needs?
which of the following poses the greatest security issues?
A company has a BYOD policy that includes tablets and smart phones. In the case of a legal
investigation, which of the following poses the greatest security issues?
Which of the following is the primary focus?
After several thefts a Chief Executive Officer (CEO) wants to ensure unauthorized do not have to
corporate grounds or its employees. The CEO just approved new budget line items for fences,
lighting, locks and CCTVs. Which of the following is the primary focus?
Which of the following steps in incident response procedures entails of the incident and identification of kno
Which of the following steps in incident response procedures entails of the incident and
identification of knowledge gained that can be applied to future handling of incidents?
Which of the following automated or semi-automated software testing techniques relies on inputting large amoun
Which of the following automated or semi-automated software testing techniques relies on
inputting large amounts of random data to detect coding errors or application loopholes?
Which of the following concerns will MOST affect the decision to use a personal device to receive company emai
A company’s BYOD policy requires the installation of a company provide mobile agent on their on
their personally owned devices which would allow auditing when an employee wants to connect a
device to the corporate email system. Which of the following concerns will MOST affect the
decision to use a personal device to receive company email?
Which of the following reasons would explain why this attack could be successful?
A penetration tester is measuring a company’s posture on social engineering. The penetration
tester sends a phishing email claiming to be from IT asking employees to click a link to update
their VPN software immediately. Which of the following reasons would explain why this attack
could be successful?
Which of the following is the MOST likely issue?
A new employee has joined the accounting department and is unable to access the accounting
server. The employee can access other network resources and the Internet. Other accounting
employees are able to access the accounting server without any issues. Which of the following is
the MOST likely issue?
Which of the following is the MOST likely cause of this issue?
Joe a sales employee is connecting to a wireless network and has entered the network information
correctly. His computer remains connected to the network but he cannot access any resources on
the network. Which of the following is the MOST likely cause of this issue?