Which of the following would provide the BEST environment for performing this testing?
Joe a technician is tasked with finding a way to test operating system patches for a wide variety of servers
before deployment to the production environment while utilizing a limited amount of hardware
resources. Which of the following would provide the BEST environment for performing this testing?
Which of the following is the BEST solution?
A custom PKI application downloads a certificate revocation list (CRL) once per day. Management
requests the list be checked more frequently. Which of the following is the BEST solution?
Which of the following would achieve this?
A security technician wants to improve the strength of a weak key by making it more secure against brute
force attacks. Which of the following would achieve this?
Which of the following principles is potentially being violated?
Joe uses his badge to enter the server room, Ann follows Joe entering without using her badge. It is later
discovered that Ann used a USB drive to remove confidential data from a server. Which of the following
principles is potentially being violated? (Select TWO)
Which of the following risk mitigation strategies should she implement in her department?
Ann the IT director wants to ensure that as hoc changes are not making their way to the production
applications. Which of the following risk mitigation strategies should she implement in her department?
Which of the following would allow users from outside of an organization to have access to internal resources?
Which of the following would allow users from outside of an organization to have access to internal
resources?
Which of the following is BEST described by a scenario where management chooses not to implement a security co
Which of the following is BEST described by a scenario where management chooses not to implement a
security control for a given risk?
Which of the following ports is used for TELNET by default?
Which of the following ports is used for TELNET by default?
which of the following types of encryption should be chosen?
When confidentiality is the primary concern which of the following types of encryption should be chosen?
Which of the following is the BEST way to run the malware scanner?
A Windows- based computer is infected with malware and is running too slowly to boot and run a
malware scanner. Which of the following is the BEST way to run the malware scanner?