Which of the following sections of the policy requirements will have the most impact on generic and shared acc
The chief security officer (CSO) has issued a new policy to restrict generic or shared accounts on
company systems. Which of the following sections of the policy requirements will have the most
impact on generic and shared accounts?
Which of the following is the first course of action that should be taken?
Joe an end user has received a virus detection warning. Which of the following is the first course
of action that should be taken?
Which of the following is the best option for meeting this goal?
A company has several public conference room areas with exposed network outlets. In the past,
unauthorized visitors and vendors have used the outlets for internet access. The help desk
manager does not want the outlets to be disabled due to the number of training sessions in the
conference room and the amount of time it takes to get the ports either patched in or enabled.
Which of the following is the best option for meeting this goal?
Which of the following describes this type of attack?
An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a
laptop look like an access point and advertises the same network as the coffee shop normally
does. Which of the following describes this type of attack?
Which of the following would show the administrator that wpa2 is also needed?
A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled
on the access point. Which of the following would show the administrator that wpa2 is also
needed?
The testing company will be using:
A security director has contracted an outside testing company to evaluate the security of a newly
developed application. None of the parameters or internal workings of the application have been
provided to the testing company prior to the start of testing. The testing company will be using:
which of the following security concepts will most effectively address the finding?
While preparing for an audit a security analyst is reviewing the various controls in place to secure
the operation of financial processes within the organization. Based on the pre assessment report,
the department does not effectively maintain a strong financial transaction control environment
due to conflicting responsibilities held by key personnel. If implemented, which of the following
security concepts will most effectively address the finding?
Which of the following would be the best option?
A chief privacy officer, Joe, is concerned that employees are sending emails to addresses outside
of the company that contain PII. He asks that the security technician to implement technology that
will mitigate this risk. Which of the following would be the best option?
Which of the following technologies can provide protection for the PKI’s escrowed keys?
The key management organization has implemented a key escrowing function. Which of the
following technologies can provide protection for the PKI’s escrowed keys?
Which of the following are unique to white box testing methodologies?
Which of the following are unique to white box testing methodologies? (Select two)