Which of the following types of risk mitigation strategies is being followed?
A security administrator is required to submit a detailed implementation plan and back out plan to get
approval prior to updating the firewall and other security devices. Which of the following types of risk
mitigation strategies is being followed?
Which of the following authentication services uses a default TCP of 389?
Which of the following authentication services uses a default TCP of 389?
TO meet confidentiality the tapes should be:
A software company sends their offsite backup tapes to a third party storage facility. TO meet
confidentiality the tapes should be:
Which of the following should Ann enable to support both encryption and proxy services?
Ann, a technician, wants to implement a single protocol on a remote server which will enable her to
encrypt and proxy all of her traffic though the remote server via SOCKS5. Which of the following should
Ann enable to support both encryption and proxy services?
Which of the following or techniques does this indicate?
Which of the following should the company implement?
A company discovers an unauthorized device accessing network resources through one of many network
drops in a common area used by visitors. The company decides that is wants to quickly prevent
unauthorized devices from accessing the network but policy prevents the company from making changes
on every connecting client. Which of the following should the company implement?
Which of the following is the consequence of this reported problem?
The helpdesk is receiving numerous reports that a newly installed biometric reader at the entrance of the
data center has a high of false negatives. Which of the following is the consequence of this reported
problem?
Which of the following policies is MOST likely being violated?
A software developer places a copy of the source code for a sensitive internal application on a company
laptop to work remotely. Which of the following policies is MOST likely being violated?
Which of the following addresses refer to localhost?
While testing a new host based firewall configuration a security administrator inadvertently blocks access
to localhost which causes problems with applications running on the host. Which of the following
addresses refer to localhost?
Which of the following potential incident types is this?
A user has reported inadvertently sending an encrypted email containing PII to an incorrect distribution
group. Which of the following potential incident types is this?