Which of the following authentication services is the MOST likely using?
Joe, a network administrator, is able to manage the backup software console by using his network login
credentials. Which of the following authentication services is the MOST likely using?
Which of the following security controls is the BEST option to prevent auditors from accessing or modifying pa
An organization is implementing a password management application which requires that all local
administrator passwords be stored and automatically managed. Auditors will be responsible for
monitoring activities in the application by reviewing the logs. Which of the following security controls is
the BEST option to prevent auditors from accessing or modifying passwords in the application?
which of the following could be implemented without increasing the amount of space required at the entrance?
A security administrator is tackling issues related to authenticating users at a remote site. There have
been a large number of security incidents that resulted from either tailgating or impersonation of
authorized users with valid credentials. The security administrator has been told to implement multifactor
authentication in order to control facility access. To secure access to the remote facility, which of the
following could be implemented without increasing the amount of space required at the entrance?
Which of the following actions should the administrator take?
The security administrator notices a user logging into a corporate Unix server remotely as root. Which of
the following actions should the administrator take?
Which of the following is MOST appropriate to use?
A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer
will have very different job requirements and use unique tools and applications in their job. Which of the
following is MOST appropriate to use?
Which of the following should be modified to assure that Ann has read access to the file?
A file on a Linux server has default permissions of rw-rw-r–. The system administrator has verified that
Ann, a user, is not a member of the group owner of the file. Which of the following should be modified to
assure that Ann has read access to the file?
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key
Which of the following protocols uses an asymmetric key to open a session and then establishes a
symmetric key for the remainder of the session?
Which of the following types of cryptography is being used here for the key exchange?
A company uses PGP to ensure that sensitive email is protected. Which of the following types of
cryptography is being used here for the key exchange?
Which of the following is true about asymmetric encryption?
Which of the following is true about asymmetric encryption?
Encryption used by RADIUS is BEST described as:
Encryption used by RADIUS is BEST described as: