Which of the following automated or semi-automated software testing techniques relies on inputting large amoun
Which of the following automated or semi-automated software testing techniques relies on inputting
large amounts of random data to detect coding errors or application loopholes?
Which of the following concerns will MOST affect the decision to use a personal device to receive company emai
A company’s BYOD policy requires the installation of a company provide mobile agent on their on their
personally owned devices which would allow auditing when an employee wants to connect a device tothe corporate email system. Which of the following concerns will MOST affect the decision to use a
personal device to receive company email?
Which of the following reasons would explain why this attack could be successful?
A penetration tester is measuring a company’s posture on social engineering. The penetration tester
sends a phishing email claiming to be from IT asking employees to click a link to update their VPN
software immediately. Which of the following reasons would explain why this attack could be successful?
Which of the following is the MOST likely issue?
The employee can access other network resources and the Internet. Other accounting employees are
able to access the accounting server without any issues. Which of the following is the MOST likely issue?
Which of the following is the MOST likely cause of this issue?
Joe a sales employee is connecting to a wireless network and has entered the network information
correctly. His computer remains connected to the network but he cannot access any resources on the
network. Which of the following is the MOST likely cause of this issue?
Which of the following is used to inform users of the repercussions of releasing proprietary information?
Which of the following is used to inform users of the repercussions of releasing proprietary information?
Which of the following will alert the security team when elevated access is applied?
A review of administrative access has discovered that too many accounts have been granted
administrative rights. Which of the following will alert the security team when elevated access is applied?
This is known as a:
When an authorized application is installed on a server, the application triggers an alert on the HIDS. This
is known as a:
which of the following scenarios would it be preferable to implement file level encryption instead of whole di
In which of the following scenarios would it be preferable to implement file level encryption instead of
whole disk encryption?
which of the following would be MOST appropriate for fault tolerance?
For high availability which of the following would be MOST appropriate for fault tolerance?