Which of the following is the MOST important consideration when deploying a CCTV camera to meet the requiremen
A security administrator is installing a single camera outside in order to detect unauthorized vehicles in
the parking lot. Which of the following is the MOST important consideration when deploying a CCTV
camera to meet the requirement?
Which of the following has the GREATEST impact on the time it takes to crack the passwords?
A system administrator wants to configure a setting that will make offline password cracking more
challenging. Currently the password policy allows upper and lower case characters a minimum length of 5
and a lockout after 10 invalid attempts. Which of the following has the GREATEST impact on the time it
takes to crack the passwords?
which of the following?
Establishing a method to erase or clear memory is an example of securing which of the following?
which of the following?
Joe processes several requisitions during the day and during the night shift they are approved by Ann.
This is an example of which of the following?
Which of the following combinations should be used to include all of the given IP addresses?
A security administrator would like to write an access rule to block the three IP addresses given below.
Which of the following combinations should be used to include all of the given IP addresses?
192.168.12.255
192.168.12.227
192.168.12.229
what the administrator is doing?
After installing a new Linux system the administrator runs a command that records the size, permissions,
and MD5 sum of all the files on the system. Which of the following describes what the administrator is
doing?
Which of the following procedures should the administrator perform FIRST on the system?
An intrusion has occurred in an internet facing system. The security administrator would like to gather
forensic evidence while the system is still in operation. Which of the following procedures should the
administrator perform FIRST on the system?
Which of the following wireless standards is backwards compatible with 802.11g?
Which of the following wireless standards is backwards compatible with 802.11g?
Which of the following ports will be used for logging into secure websites?
Which of the following ports will be used for logging into secure websites?
which of the following?
The below report indicates that the system is MOST likely infected by which of the following?
Protocol LOCAL IP FOREIGN IP STATE
TCP 0.0.0:445 0.0.0.0:0 Listening
TCP 0.0.0.0:3390 0.0.0.0:0 Listening