which of the following attacks?
Attempting to inject 50 alphanumeric key strokes including spaces into an application input field that only
expects four alpha characters in considered which of the following attacks?
Which of the following would accomplish this requirement?
An organization is required to log all user internet activity. Which of the following would accomplish this
requirement?
Which of the following should be used?
An agent wants to create fast and efficient cryptographic keys to use with Diffie-Hellman without using
prime numbers to generate the keys. Which of the following should be used?
Which of the following is Joe attempting to prevent?
Joe an application developer is building an external facing marketing site. There is an area on the page
where clients may submit their feedback to articles that are posted. Joe filters client-side JAVA input.
Which of the following is Joe attempting to prevent?
Which of the following could BEST prevent a situation like this form occurring again?
A video surveillance audit recently uncovered that an employee plugged in a personal laptop and used
the corporate network to browse inappropriate and potentially malicious websites after office hours.
Which of the following could BEST prevent a situation like this form occurring again?
Which of the following attacks does this describes?
A server administrator notes that a fully patched application often stops running due to a memory error.
When reviewing the debugging logs they notice code being run calling an internal process to exploit the
machine. Which of the following attacks does this describes?
Which of the following could help reduce the likelihood of this situation occurring in the future?
A resent OS patch caused an extended outage. It took the IT department several hours to uncover the
cause of the issue due to the system owner who installed the patch being out of the office. Which of the
following could help reduce the likelihood of this situation occurring in the future?
Which of the following should be configured on the network switch to prevent this from happening?
The Chief Information Security Officer (CISO) is concerned that users could bring their personal laptops to
work and plug them directly into the network port under their desk. Which of the following should be
configured on the network switch to prevent this from happening?
Which of the following could she implement to add an additional factor of authorization?
Ann a network administrator has been tasked with strengthening the authentication of users logging into
systems in area containing sensitive information. Users log in with usernames and passwords, following
by a retinal scan. Which of the following could she implement to add an additional factor of
authorization?
which of the following technologies in the MOST critical layer of defense for such systems?
In an environment where availability is critical such as Industrial control and SCADA networks, which of
the following technologies in the MOST critical layer of defense for such systems?