Which of the following would allow the organization to BEST meet this business requirement?
An organization has a need for security control that identifies when an organizational system has been
unplugged and a rouge system has been plugged in. The security control must also provide the ability to
supply automated notifications. Which of the following would allow the organization to BEST meet this
business requirement?
Which of the following authentication factors are being used by the bank?
Internet banking customers currently use an account number and password to access their online
accounts. The bank wants to improve security on high value transfers by implementing a system which
call users back on a mobile phone to authenticate the transaction with voice verification. Which of the
following authentication factors are being used by the bank?
Which of the following would BEST mitigate this?
A security administrator has concerns that employees are installing unapproved applications on their
company provide smartphones. Which of the following would BEST mitigate this?
Which of the following will accomplish the security manager’s objective?
The security manager must store a copy of a sensitive document and needs to verify at a later point that
the document has not been altered. Which of the following will accomplish the security manager’s
objective?
Which of the following steps did the administrator perform?
A security Operations Center was scanning a subnet for infections and found a contaminated machine.
One of the administrators disabled the switch port that the machine was connected to, and informed a
local technician of the infection. Which of the following steps did the administrator perform?
Which of the following should the administrator deploy?
A security administrator wants to block unauthorized access to a web server using a locally installed
software program. Which of the following should the administrator deploy?
Which of the following is this known as?
A network administrator has identified port 21 being open and the lack of an IDS as a potential risk to the
company. Due to budget constraints, FTP is the only option that the company can is to transfer data and
network equipment cannot be purchased. Which of the following is this known as?
Which of the following logs should the administrator search for information regarding the breach?
A security administrator is investigating a recent server breach. The breach occurred as a result of a zeroday attack against a user program running on the server. Which of the following logs should the
administrator search for information regarding the breach?
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
A user attempts to install new and relatively unknown software recommended by a colleague. The user is
unable to install the program, despite having successfully installed other programs previously. Which of
the following is MOST likely the cause for the user’s inability to complete the installation?
Which of the following authentication services is being deployed by the administrator?
A system administrator is configuring shared secrets on servers and clients. Which of the following
authentication services is being deployed by the administrator? (Select two.)