which of the following administrative control policy considerations MUST be addressed?
If an organization wants to implement a BYOD policy, which of the following administrative control
policy considerations MUST be addressed? (Select two)
Which of the following should the technician implement?
A security technician wants to implement stringent security controls over web traffic by restricting
the client source TCP ports allowed through the corporate firewall. Which of the following should
the technician implement?
Which of the following design elements would be used to segment the network based on organizational groups?
An administrator is configuring a network for all users in a single building. Which of the following
design elements would be used to segment the network based on organizational groups? (Select
two)
Which of the following options could improve the safety and security of the datacenter further?
A datacenter has suffered repeated burglaries which led to equipment theft and arson. In the past,
the thieves have demonstrated a determination to bypass any installed safeguards. After mantraps
were installed to prevent tailgating, the thieves crashed through the wall of datacenter with a
vehicle after normal business hours. Which of the following options could improve the safety and
security of the datacenter further? (Select two)
Which of the following can take advantage of man in the middle techniques to prevent data exfiltration?
Which of the following can take advantage of man in the middle techniques to prevent data
exfiltration?
Which of the following could be used?
An administrator must select an algorithm to encrypt data at rest. Which of the following could be
used?
which of the following?
RC4 is a strong encryption protocol that is general used with which of the following?
Which of the following should the consultant do in order to produce more accurate results?
An outside security consultant produces a report of several vulnerabilities for a particular server.
Upon further investigation, it is determine that the vulnerability reported does not apply to the
platform the server is running on. Which of the following should the consultant do in order to
produce more accurate results?
which of the following types of attack is this application susceptible?
A programmer has allocated a 32 bit variable to store the results of an operation between two user
supplied 4 byte operands. To which of the following types of attack is this application susceptible?
Which of the following would be the best way to prevent this type of attack from occurring again?
A security administrator is reviewing logs and notices multiple attempts to access the HVAC
controls by a workstation with an IP address from the open wireless network. Which of the
following would be the best way to prevent this type of attack from occurring again?