Which of the following is the MOST likely cause?
An employee’s mobile device associates with the company’s guest WiFi SSID, but then is unable to
retrieve email. The email settings appear to be correct. Which of the following is the MOST likely cause?
Which of the following would BEST prevent this from occurring again?
A malicious individual used an unattended customer service kiosk in a busy store to change the prices of
several products. The alteration was not noticed until several days later and resulted in the loss of several
thousand dollars for the store. Which of the following would BEST prevent this from occurring again?
Which of the following is the MOST likely reason for her failure to enter the data center?
In order to enter a high-security data center, users are required to speak the correct password into a
voice recognition system. Ann, a member of the sales department, overhears the password and later
speaks it into the system. The system denies her entry and alerts the security team. Which of the
following is the MOST likely reason for her failure to enter the data center?
Which of the following are primary reasons to sign emails with digital certificates?
A company requires that all users enroll in the corporate PKI structure and digitally sign all emails. Which
of the following are primary reasons to sign emails with digital certificates? (Select TWO)
Which of the following is the risk calculation that the CIO is asking for?
The Chief Information Officer (CIO) has asked a security analyst to determine the estimated costs
associated with each potential breach of their database that contains customer information. Which of the
following is the risk calculation that the CIO is asking for?
Which of the following BEST describes the appropriate method of testing or technique to use in this scenario?
A security assurance officer is preparing a plan to measure the technical state of a customer’s enterprise.
The testers employed to perform the audit will be given access to the customer facility and network. The
testers will not be given access to the details of custom developed software used by the customer.
However the testers with have access to the source code for several open source applications and pieces
of networking equipment used at the facility, but these items will not be within the scope of the audit.
Which of the following BEST describes the appropriate method of testing or technique to use in this
scenario? (Select TWO)
Which of the following authentication services combines authentication and authorization in a use profile and
Which of the following authentication services combines authentication and authorization in a use profile
and use UDP?
which of the following is the BEST combination of factors?
A security administrator is designing an access control system, with an unlimited budget, to allow
authenticated users access to network resources. Given that a multifactor authentication solution is more
secure, which of the following is the BEST combination of factors?
Will Ann and Joe be able to run the file?
The access control list (ACL) for a file on a server is as follows:
User: rwx
User: Ann: r- –
User: Joe: r- –
Group: rwx
Group: sales: r-x
Other: r-x
Joe and Ann are members of the Human Resources group. Will Ann and Joe be able to run the file?
Which of the following should the consultant recommend to the company, in order to mitigate the risk of employ
Using a protocol analyzer, a security consultant was able to capture employee’s credentials. Which of the
following should the consultant recommend to the company, in order to mitigate the risk of employees
credentials being captured in the same manner in the future?