Which of the following default ports on the firewall must the security engineer open to accomplish this task?
The finance department just procured a software application that needs to communicate back to the
vendor server via SSL. Which of the following default ports on the firewall must the security engineer
open to accomplish this task?
Which of the following did the organization fail to properly implement?
After an audit, it was discovered that an account was not disabled in a timely manner after an employee
has departed from the organization. Which of the following did the organization fail to properly
implement?
Which of the following BEST would protect the building from this threat?
The Chief Security Officer (CSO) for a datacenter in a hostile environment is concerned about protecting
the facility from car bomb attacks. Which of the following BEST would protect the building from this
threat? (Select two.)
Which of the following poses the greatest risk with this integration?
Users can authenticate to a company’s web applications using their credentials form a popular social
media site. Which of the following poses the greatest risk with this integration?
Which of the following provides the BEST solution?
A corporation has experienced several media leaks of proprietary data on various web forums. The posts
were made during business hours and it is believed that the culprit is posting during work hours from a
corporate machine. The Chief Information Officer (CIO) wants to scan internet traffic and keep records for
later use in legal proceedings once the culprit is found. Which of the following provides the BEST
solution?
Which of the following describes the procedure the administrator has performed?
The security administrator runs an rpm verify command which records the MD5 sum, permissions, and
timestamp of each file on the system. The administrator saves this information to a separate server.
Which of the following describes the procedure the administrator has performed?
How can the administrator resolve this?
Users are trying to communicate with a network but are unable to do so. A network administrator sees
connection attempts on port 20 from outside IP addresses that are being blocked. How can the
administrator resolve this?
Which of the following is the MOST likely reason for her failure to enter the data center?
In order to enter a high-security datacenter, users are required to speak the password into a voice
recognition system. Ann a member if the sales department over hears the password and upon speaks it
into the system. The system denies her entry and alerts the security team. Which of the following is the
MOST likely reason for her failure to enter the data center?
which of the following attacks is MOST likely underway if the company wireless network uses the same wireless
Given the following list of corporate access points, which of the following attacks is MOST likely underway
if the company wireless network uses the same wireless hardware throughout?
MAC SID
00:01:AB:FA:CD:34 Corporate AP
00:01:AB:FA:CD:35 Corporate AP
00:01:AB:FA:CD:36 Corporate AP
00:01:AB:FA:CD:37 Corporate AP
00:01:AB:FA:CD:34 Corporate AP
Which of the following can be used to perform this action?
A system administrator has noticed network performance issues and wants to gather performance data
from the gateway router. Which of the following can be used to perform this action?