Which of the following is an attack designed to activate based on date?
Which of the following is an attack designed to activate based on date?
Which of the following techniques is MOST likely to gather this type of data?
A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7
Which of the following techniques is MOST likely to gather this type of data?
Which of the following security controls would be MOST appropriate?
A company wants to prevent unauthorized access to its secure data center. Which of the following
security controls would be MOST appropriate?
Which of the following password parameters is MOST likely misconfigured?
Company policy requires employees to change their passwords every 60 days. The security manager has
verified all systems are configured to expire passwords after 60 days. Despite the policy and technical
configuration, weekly password audits suggest that some employees have had the same weak passwords
in place longer than 60 days. Which of the following password parameters is MOST likely misconfigured?
Which of the following algorithms should the administrator select?
An administrator would like to utilize encryption that has comparable speed and strength to the AES
cipher without using AES itself. The cipher should be able to operate in the same modes as AES and utilize
the same minimum bit strength. Which of the following algorithms should the administrator select?
The approach of malware analysis can BEST be described as:
A security analyst has a sample of malicious software and needs to know what the sample does. The
analyst runs the sample in a carefully-controlled and monitored virtual machine to observe the software’s
behavior. The approach of malware analysis can BEST be described as:
which of the following are being used to secure data in transport?
An SSL session is taking place. After the handshake phase has been established and the cipher has been
selected, which of the following are being used to secure data in transport? (Select TWO)
Which of the following is the BEST method to mitigate security risk within the environment?
Company A and Company B both supply contractual services to a fast paced and growing auto parts
manufacturer with a small local Area Network (LAN) at its local site. Company A performs in-house billing
and invoices services for the local auto parts manufactacturer. Company B provides in-house parts and
widgets services for the local auto parts manufacturers. Which of the following is the BEST method to
mitigate security risk within the environment?
Which of the following types of attack is MOST likely occurring?
The Chief Executive Officer (CEO) Joe notices an increase in the wireless signal in this office and thanks
the IT director for the increase in network speed, Upon investigation the IT department finds an access
point hidden in the dropped ceiling outside of joe’s office. Which of the following types of attack is MOST
likely occurring?
Which of the following documents specifies how much data can be stored offsite, and how quickly the data can b
A security administrator is reviewing the company’s data backup plan. The plan implements nightly offsite
data replication to a third party company. Which of the following documents specifies how much data
can be stored offsite, and how quickly the data can be retrieved by the company from the third party?