Which of the following types of malware is designed to provide access to a system when normal authentication f
Which of the following types of malware is designed to provide access to a system when normal
authentication fails?
Which of the following describes this application threat?
Ann is concerned that the application her team is currently developing is vulnerable to unexpected user
input that could lead to issues within the memory is affected in a detrimental manner leading to potential
exploitation. Which of the following describes this application threat?
Which of the following can be used for both encryption and digital signatures?
Which of the following can be used for both encryption and digital signatures?
Which of the following is being used by the certificate authority in this exchange?
A user tries to visit a web site with a revoked certificate. In the background a server from the certificate
authority only sends the browser revocation information about the domain the user is visiting. Which of
the following is being used by the certificate authority in this exchange?
Which of the following is Joe trying to achieve?
Joe wants to employ MD5 hashing on the company file server. Which of the following is Joe trying to
achieve?
Which of the following choices BEST mitigates the security risk of public web surfing?
By hijacking unencrypted cookies an application allows an attacker to take over existing web sessions that
do not use SSL or end to end encryption. Which of the following choices BEST mitigates the security risk
of public web surfing? (Select TWO)
Which of the following encryptions needs BOTH of these needs?
The security administration team at a company has been tasked with implementing a data-at-rest
solution for its company storage. Due to the large amount of storage the Chief Information Officer (CISO)
decides that a 128-bit cipher is needed but the CISO also does not want to degrade system performance
any more than necessary. Which of the following encryptions needs BOTH of these needs?
which of the following poses the greatest security issues?
A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation,
which of the following poses the greatest security issues?
Which of the following is the primary focus?
After several thefts a Chief Executive Officer (CEO) wants to ensure unauthorized do not have to
corporate grounds or its employees. The CEO just approved new budget line items for fences, lighting,
locks and CCTVs. Which of the following is the primary focus?
Which of the following steps in incident response procedures entails of the incident and identification of kno
Which of the following steps in incident response procedures entails of the incident and identification of
knowledge gained that can be applied to future handling of incidents?