Which of the following protocols should he secure?
Joe, a company’s network engineer, is concerned that protocols operating at the application layer of the
OSI model are vulnerable to exploitation on the network. Which of the following protocols should he
secure?
Which of the following is preventing the users from accessing the SSH server?
Ann a security technician receives a report from a user that is unable to access an offsite SSN server. Ann
checks the firewall and sees the following rules:
Allow TCP 80
Allow TCP 443
Deny TCP 23
Deny TCP 20
Deny TCP 21
Which of the following is preventing the users from accessing the SSH server?
Which of the following control methods is the administrator using by configuring this policy?
An administrator uses a server with a trusted OS and is configuring an application to go into production
tomorrow, In order to make a new application work properly, the administrator creates a new policy that
labels the application and assigns it a security context within the trusted OS. Which of the following
control methods is the administrator using by configuring this policy?
what should be done?
A security administrator has been tasked with assisting in the forensic investigation of an incident relating
to employee misconduct. The employee’s supervisor believes evidence of this misconduct can be found
on the employee’s assigned workstation. Which of the following choices BEST describes what should be
done? (Select TWO)
Which of the following is one way to prevent this type of attack?
Joe a web developer wants to make sure his application is not susceptible to cross-site request forgery
attacks. Which of the following is one way to prevent this type of attack?
Which of the following ports should be opened on the firewall?
A security technician has been tasked with opening ports on a firewall to allow users to browse the
internet. Which of the following ports should be opened on the firewall? (Select Three)
Which of the following types of malware?
A rogue programmer included a piece of code in an application to cause the program to halt at 2:00 PM
on Monday afternoon when the application is most utilized. This is Which of the following types of
malware?
Which of the following is this an example of?
After connecting to the corporate network a user types the URL if a popular social media website in the
browser but reports being redirected to a login page with the corporate logo. Which of the following is
this an example of?
Which of the following is the team performing?
The Quality Assurance team is testing a third party application. They are primarily testing for defects and
have some understanding of how the application works. Which of the following is the team performing?
Which of the following appropriately categorizes the authentication factor that will fail in this scenario?
A user Ann has her assigned token but she forgotten her password. Which of the following appropriately
categorizes the authentication factor that will fail in this scenario?