This feature is called:
A load balancer has the ability to remember which server a particular client is using and always
directs that client to the same server. This feature is called:
Which of the following would be used to demonstrate the effectiveness of the training?
A company has recently begun to provide internal security awareness for employees. Which of the
following would be used to demonstrate the effectiveness of the training?
Which of the following would best mitigate this issue?
Users in an organization are experiencing when attempting to access certain websites. The users
report that when they type in a legitimate URL, different boxes appear on the screen, making it
difficult to access the legitimate sites. Which of the following would best mitigate this issue?
Which of the following types of testing will the penetration testing team have to conduct?
A company hires a penetration testing team to test its overall security posture. The organization
has not disclosed any information to the penetration testing team and has allocated five days for
testing. Which of the following types of testing will the penetration testing team have to conduct?
Which of the following is the BEST recommendation for the web administrator?
A web administrator has just implemented a new web server to be placed in production. As part of
the company’s security plan, any new system must go through a security test before it is placed in
production. The security team runs a port scan resulting in the following data:
21 tcp open FTP
23 tcp open Telnet
22 tcp open SSH
25 UDP open smtp
110 tcp open pop3
443 tcp open https
Which of the following is the BEST recommendation for the web administrator?
Which of the following best describes the reason for using hot and cold aisles?
Which of the following best describes the reason for using hot and cold aisles?
Which of the following authentication mechanisms should be utilized to meet this goal?
An organization has an internal PKI that utilizes client certificates on each workstation. When
deploying a new wireless network, the security engineer has asked that the new network
authenticate clients by utilizes the existing client certificates. Which of the following authentication
mechanisms should be utilized to meet this goal?
To implement the attack and delay detection, the attacker should modify both the installer file and the:
An attacker is attempting to insert malicious code into an installer file that is available on the
internet. The attacker is able to gain control of the web server that houses both the installer and
the web page which features information about the downloadable file. To implement the attack and
delay detection, the attacker should modify both the installer file and the:
Which of the following do these actions demonstrate?
After receiving the hard drive from detectives, the forensic analyst for a court case used a log to
capture corresponding events prior to sending the evidence to lawyers. Which of the following do
these actions demonstrate?
Which of the following is the BEST method to ensure access is restricted to use by only these users?
A group of users from multiple departments are working together on a project and will maintain
their digital output in a single location. Which of the following is the BEST method to ensure
access is restricted to use by only these users?