Which of the following would be MOST appropriate when configuring security on her laptop?
Ann a member of the Sales Department has been issued a company-owned laptop for use when traveling
to remote sites. Which of the following would be MOST appropriate when configuring security on her
laptop?
Which of the following application security controls has the technician attempted?
A security technician has removed the sample configuration files from a database server. Which of the
following application security controls has the technician attempted?
Which of the following controls meets this goal?
Data confidentiality must be enforces on a secure database. Which of the following controls meets this
goal? (Select TWO)
Which of the following types of controls was being used?
A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site
do not record any footage. Which of the following types of controls was being used?
which of the following?
A network security administrator is trying to determine how an attacker gained access to the corporate
wireless network. The network is configured with SSID broadcast disabled. The senior network
administrator explains that this configuration setting would only have determined an unsophisticated
attacker because of which of the following?
Which of the following is this attack called?
Joe a system administrator receives reports that users attempting to reach the corporate website are
arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the name
server log has several corporate IP addresses that were changed using Joe’s credentials. Which of the
following is this attack called?
Which of the following would address this?
Joe a technician initiated scans if the company’s 10 routers and discovered that half if the routers were
not changed from their default configuration prior installed on the network. Which of the following would
address this?
which of the following?
An employee attempts to go to a well-known bank site using the company-standard web browser by
correctly typing in the address of the site into the web browser. The employee is directed to a website
that looks like the bank’s site but is not the actual bank site. The employee’s user name and password are
subsequently stolen. This is an example of which of the following?
Which of the following authentication types has been utilized?
A user authenticates to a local directory server. The user then opens a virtualization client to connect to a
virtual server. Instead of supplying a username/password combination, the user simply checks a use
directory credentials checkbox to authenticate to the virtual server. Which of the following authentication
types has been utilized?
Which of the following security controls did the Chief Security Officer implement to BEST meet these requireme
The new Chief Information Officer (CIO) of company ABC, Joe has noticed that company XWY is always
one step ahead with similar products. He tasked his Chief Security Officer to implement new security
controls to ensure confidentiality of company ABC’s proprietary data and complete accountability for all
data transfers. Which of the following security controls did the Chief Security Officer implement to BEST
meet these requirements? (Select Two)