Which of the following would be BEST course of action?
Joe the system administrator has noticed an increase in network activity from outside sources. He
wishes to direct traffic to avoid possible penetration while heavily monitoring the traffic with little to
no impact on the current server load. Which of the following would be BEST course of action?
Which of the following should the administrator do to verify if this is indeed a false positive?
An assessment too reports that the company’s web server may be susceptible to remote buffer
overflow. The web server administrator insists that the finding is a false positive. Which of the
following should the administrator do to verify if this is indeed a false positive?
which of the following firewall rules would accomplish this objective?
The sales force in an organization frequently travel to remote sites and requires secure access to
an internal server with an IP address of 192.168.0.220. Assuming services are using default ports,
which of the following firewall rules would accomplish this objective? (Select Two)
Which of the following would BEST alleviate her concerns?
Ann, a security administrator at a call center, has been experiencing problems with users
intentionally installing unapproved and occasionally malicious software on their computers. Due to
the nature of their jobs, Ann cannot change their permissions. Which of the following would BEST
alleviate her concerns?
Which of the following will provide data encryption, key management and secure application launching?
Which of the following will provide data encryption, key management and secure application
launching?
which of the following?
It is MOST difficult to harden against which of the following?
Which of the following is the BEST document that the company should prepare to negotiate with the ISP?
A company has experienced problems with their ISP, which has failed to meet their informally
agreed upon level of service. However the business has not negotiated any additional formal
agreements beyond the standard customer terms. Which of the following is the BEST document
that the company should prepare to negotiate with the ISP?
Which of the following authentication services accomplishes this objective?
A company would like to implement two-factor authentication for its vulnerability management
database to require system administrators to use their token and random PIN codes. Which of the
following authentication services accomplishes this objective?
Which of the following is considered the MOST secure way to handle master keys associated with these certifica
A company has a corporate infrastructure where end users manage their own certificate keys.
Which of the following is considered the MOST secure way to handle master keys associated with
these certificates?
Which of the following controls would BEST mitigate this issue?
A recent audit has revealed that several users have retained permissions to systems they should
no longer have rights to after being promoted or changed job positions. Which of the following
controls would BEST mitigate this issue?