Which of the following types of attacks may be underway?
An employee from the fire Marshall’s office arrives to inspect the data center. The operator allows him to
bypass the multi-factor authentication to enter the data center. Which of the following types of attacks
may be underway?
Which of the following security controls will BEST achieve this goal?
A company recently received accreditation for a secure network, In the accreditation letter, the auditor
specifies that the company must keep its security plan current with changes in the network and evolve
the systems to adapt to new threats. Which of the following security controls will BEST achieve this goal?
which of the following should be implemented?
A cyber security administrator receives a list of IPs that have been reported as attempting to access the
network. To identify any possible successful attempts across the enterprise, which of the following should
be implemented?
Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS server in o
Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS server in
order to carry out URL redirection?
Which of the following choices BEST meets her intent of security and access?
Ann a new small business owner decides to implement WiFi access for her customers. There are several
other businesses nearby who also have WiFi hot spots. Ann is concerned about security of the wireless
network and wants to ensure that only her customers have access. Which of the following choices BEST
meets her intent of security and access?
Which of the following technologies provide the MOST complete protection?
A security engineer is tasked with encrypting corporate email. Which of the following technologies
provide the MOST complete protection? (Select TWO)
Which of the following is the GREATEST security concern of allowing employees to bring in their personally own
Which of the following is the GREATEST security concern of allowing employees to bring in their
personally owned tablets and connecting to the corporate network?
which of the following phases of incident response?
Searching for systems infected with malware is considered to be which of the following phases of incident
response?
Which of the following services could be run on the VPN concentrator to perform this authentication?
A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a
backend directory service. Which of the following services could be run on the VPN concentrator to
perform this authentication?
Which of the following can BEST reduce the likelihood of this incident occurring again?
A webpage displays a potentially offensive advertisement on a computer. A customer walking by notices
the displayed advertisement and files complaint. Which of the following can BEST reduce the likelihood of
this incident occurring again?