Which of the following will once defined, be the requirement for restoration of these systems within a certain
A Company has recently identified critical systems that support business operations. Which of the
following will once defined, be the requirement for restoration of these systems within a certain period of
time?
Which of the following practices are they following to ensure application integrity?
The software developer is responsible for writing the code and promoting from the development network
to the quality network. The network administrator is responsible for promoting code to the application
servers. Which of the following practices are they following to ensure application integrity?
Which of the following should Ann do to retrieve her email messages?
Ann is traveling for business and is attempting to use the hotel’s wireless network to check for new
messages. She selects the hotel’s wireless SSID from a list of networks and successfully connects. After
opening her email client and waiting a few minutes, the connection times out. Which of the following
should Ann do to retrieve her email messages?
Which of the following password attacks involves attempting all kinds of keystroke combinations on the keyboar
Which of the following password attacks involves attempting all kinds of keystroke combinations on the
keyboard with the intention to gain administrative access?
Which of the following should Ann recommend that would BEST address her concerns?
Ann, a security administrator, is strengthening the security controls of the company’s campus. Her goal is
to prevent people from accessing open locations that are not supervised, such as around the receiving
dock. She is also concerned that employees are using these entry points as a way of bypassing the
security guard at the main entrance. Which of the following should Ann recommend that would BEST
address her concerns?
Which of the following is MOST likely being used?
While an Internet café a malicious user is causing all surrounding wireless connected devices to have
intermittent and unstable connections to the access point. Which of the following is MOST likely being
used?
Which of the following is the BEST technical control that could be implemented to reduce the amount of easily
A password audit has revealed that a significant percentage if end-users have passwords that are easily
cracked. Which of the following is the BEST technical control that could be implemented to reduce the
amount of easily “crackable” passwords in use?
Which of the following is the MOST secure combination to implement to meet this goal?
While working on a new project a security administrator wants to verify the integrity of the data in the
organizations archive library. Which of the following is the MOST secure combination to implement to
meet this goal? (Select TWO)
Which of the following should be performed after the server has been restored?
A company has been attacked and their website has been altered to display false information. The
security administrator disables the web server service before restoring the website from backup. An audit
was performed on the server and no other data was altered. Which of the following should be performed
after the server has been restored?
Which of the following tools could BEST be used to determine how the employee is connecting to the reverse pro
A security administrator suspects that an employee in the IT department is utilizing a reverse proxy to
bypass the company’s content filter and browse unapproved and non-work related sites while at work.
Which of the following tools could BEST be used to determine how the employee is connecting to the
reverse proxy?