Which of the following could be utilized to notify the network support group when computers without the antivi
Recently the desktop support group has been performing a hardware refresh and has replaced
numerous computers. An auditor discovered that a number of the new computers did not have the
company’s antivirus software installed on them, Which of the following could be utilized to notify
the network support group when computers without the antivirus software are added to the
network?
Which of the following actions should be performed?
An administrator needs to protect against downgrade attacks due to various vulnerabilities in
SSL/TLS. Which of the following actions should be performed? (Select TWO)
Which of the following would BEST satisfy these requirements?
A developer needs to utilize AES encryption in an application but requires the speed of encryption
and decryption to be as fast as possible. The data that will be secured is not sensitive so speed is
valued over encryption complexity. Which of the following would BEST satisfy these
requirements?
This is an example of:
During a code review a software developer discovers a security risk that may result in hundreds of
hours of rework. The security team has classified these issues as low risk. Executive management
has decided that the code will not be rewritten. This is an example of:
Which of the following would have prevented the network outage?
A network was down for several hours due to a contractor entering the premises and plugging
both ends of a network cable into adjacent network jacks. Which of the following would have
prevented the network outage? (Select Two)
Which of the following attacks may be occurring?
After disabling SSID broadcast, a network administrator still sees the wireless network listed in
available networks on a client laptop. Which of the following attacks may be occurring?
Which of the following job roles should receive training on forensics, chain of custody, and the order of vola
A security manager is preparing the training portion of an incident plan. Which of the following job
roles should receive training on forensics, chain of custody, and the order of volatility?
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is calle
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest
is called:
Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
Which of the following is a proprietary protocol commonly used for router authentication across an
enterprise?
Which of the following commands can be used to see processes that are listening on a TCP port?
While responding to an incident on a new Windows server, the administrator needs to disable
unused services. Which of the following commands can be used to see processes that are
listening on a TCP port?