Which of the following security goals would this meet?
A university has a building that holds the power generators for the entire campus. A risk assessment was
completed for the university and the generator building was labeled as a high risk. Fencing and lighting
was installed to reduce risk. Which of the following security goals would this meet?
Which of the following represents the BEST configuration used in order to prevent unauthorized remote access w
Log file analysis on a router reveals several unsuccessful telnet attempts to the virtual terminal (VTY)
lines. Which of the following represents the BEST configuration used in order to prevent unauthorized
remote access while maintaining secure availability for legitimate users?
Which of the following kind of IDS is in use?
Four weeks ago a network administrator applied a new IDS and allowed it to gather baseline data. As
rumors of a layoff begins to spread, the IDS alerted the network administrator that access to sensitive
client files had risen for above normal. Which of the following kind of IDS is in use?
Which of the following could an administrator use to ensure that unauthorized devices are not allowed to acces
A BYOD policy in which employees are able to access the wireless guest network is in effect in an
organization. Some users however are using the Ethernet port in personal laptops to the wired network.
Which of the following could an administrator use to ensure that unauthorized devices are not allowed to
access the wired network?
Which of the following would BEST ensure the availability of the employee database should happen to the server
During an office move a sever containing the employee information database will be shut down and
transported to a new location. Which of the following would BEST ensure the availability of the employee
database should happen to the server during the move?
Which of the following is primarily used to provide fault tolerance at the application level?
Which of the following is primarily used to provide fault tolerance at the application level? (Select TWO)
Which of the following cipher suites should the administrator select to accomplish this goal?
A security administrator would like the corporate webserver to select perfect forward secrecy ciphers
first. Which of the following cipher suites should the administrator select to accomplish this goal?
Which of the following is missing?
An administrator is having difficulty configuring WPA2 Enterprise using EAP-PEAP-MSCHAPv2. The
administrator has configured the wireless access points properly, and has configured policies on the
RADIUS server and configured settings on the client computers. Which of the following is missing?
Which of the following is the MOST likely cause of this dispute?
A business has recently adopted a policy allowing employees to use personal cell phones and tablets to
access company email accounts while out of the office. Joe an employee was using a personal cell phone
for email access and was recently terminated. It is suspected that Joe saved confidential client emails on
his personal cell phone. Joe claims that the data on the phone is completely personal and refuse to allow
the company access to inspect the cell phone. Which of the following is the MOST likely cause of this
dispute?
Which of the following would BEST prevent these issues from reoccurring?
Mobile tablets are used by employees on the sales floor to access customer data. Ann a customer
recently reported that another customer was able to access her personal information on the tablet after
the employee left the area. Which of the following would BEST prevent these issues from reoccurring?