Which of the following should be configured in the new application to enable this functionality?
An application developer needs to allow employees to use their network credentials to access a
new application being developed. Which of the following should be configured in the new
application to enable this functionality?
Which of the following could BEST prevent this from occurring again?
During a routine audit it is discovered that someone has been using a state administrator account
to log into a seldom used server. The person used server. The person has been using the server
to view inappropriate websites that are prohibited to end users. Which of the following could BEST
prevent this from occurring again?
Which of the following practices would best allow for this testing while keeping the corporate network safe?
A security engineer would like to analyze the effect of deploying a system without patching it to
discover potential vulnerabilities. Which of the following practices would best allow for this testing
while keeping the corporate network safe?
Which of the following controls can be implemented to prevent such unauthorized changes in the future?
The internal audit group discovered that unauthorized users are making unapproved changes to
various system configuration settings. This issue occurs when previously authorized users transfer
from one department to another and maintain the same credentials. Which of the following
controls can be implemented to prevent such unauthorized changes in the future?
Which of the following best describes this technique?
In order to gain an understanding of the latest attack tools being used in the wild, an administrator
puts a Unix server on the network with the root users password to set root. Which of the following
best describes this technique?
Which of the following should be configured?
An administrator, Ann, wants to ensure that only authorized devices are connected to a switch.
She decides to control access based on MAC addresses. Which of the following should be
configured?
Which of the following was implemented to detect this issue?
A one time security audit revealed that employees do not have the appropriate access to system
resources. The auditor is concerned with the fact that most of the accounts audited have
unneeded elevated permission to sensitive resources. Which of the following was implemented to
detect this issue?
what feature of virtualization?
A security analyst has a sample of malicious software and needs to know what the sample in a
carefully controlled and monitored virtual machine to observe the software’s behavior. After the
software has run, the analyst returns the virtual machines OS to a pre-defined know good state
using what feature of virtualization?
Which of the following protocols should be used to this?
Joe, the chief technical officer (CTO) is concerned that the servers and network devices may not
be able to handle the growing needs of the company. He has asked his network engineer to being
monitoring the performance of these devices and present statistics to management for capacity
planning. Which of the following protocols should be used to this?
Which of the following device attributes was used to determine that the device was unauthorized?
A security administrator is responsible for ensuring that there are no unauthorized devices utilizing
the corporate network. During a routine scan, the security administrator discovers an unauthorized
device belonging to a user in the marketing department. The user is using an android phone in
order to browse websites. Which of the following device attributes was used to determine that the
device was unauthorized?