Which of the following reasons allowed the penetration tester to access the server room?
A worker dressed in a fire suppression company’s uniform asks to be let into the server room to perform
the annual check in the fire extinguishers. The system administrator allows the worker into the room,
only to discover hours later that the worker was actually a penetration tester. Which of the following
reasons allowed the penetration tester to access the server room?
Which of the following prevents an attacker from learning authorized MAC addresses?
A company uses port security based on an approved MAC list to secure its wired network and WPA2 to
secure its wireless network. Which of the following prevents an attacker from learning authorized MAC
addresses?
Which of the following should the technician implement?
A security technician is implementing PKI on a Network. The technician wishes to reduce the amount of
bandwidth used when verifying the validity of a certificate. Which of the following should the technician
implement?
Which of the following should the manager select to BEST detect and provide notification of these occurrences?
The network security manager has been notified by customer service that employees have been sending
unencrypted confidential information via email. Which of the following should the manager select to
BEST detect and provide notification of these occurrences?
Which of the following should the administrator do to accommodate all devices and provide the MOST security?
While troubleshooting a new wireless 802.11 ac network an administrator discovers that several of the
older systems cannot connect. Upon investigation the administrator discovers that the older devices only
support 802.11 and RC4. The administrator does not want to affect the performance of the newer 802.11
ac devices on the network. Which of the following should the administrator do to accommodate all
devices and provide the MOST security?
Which of the following authentication services is the security administrator troubleshooting?
A security administrator is troubleshooting an authentication issues using a network sniffer. The security
administrator reviews a packet capture of the authentication process and notices that authentication is
performed using extensible markup over SOAP. Which of the following authentication services is the
security administrator troubleshooting?
what is the maximum number of hosts each department could have?
Given a class C network a technician has been tasked with creating a separate subnet for each of the
eight departments in the company. Which of the following network masks would allow for each
department to have a unique network space and what is the maximum number of hosts each department
could have?
A software security concern when dealing with hardware and devices that have embedded software or operating sy
A software security concern when dealing with hardware and devices that have embedded software or
operating systems is:
Which of the following areas is MOST important for the Chief Information Security Officer to focus on when rev
A major medical corporation is investigating deploying a web based portal for patients to access their
medical records. The medical corporation has a long history of maintaining IT security but is considering
having a third party vendor create the web portal. Which of the following areas is MOST important for the
Chief Information Security Officer to focus on when reviewing proposal from vendors interested in
creating the web portal?
Which of the following authentication methods requires the user, service provider and an identity provider to
Which of the following authentication methods requires the user, service provider and an identity
provider to take part in the authentication process?