Which of the following is the BEST document that the company should prepare to negotiate with the ISP?
A company has experienced problems with their ISP, which has failed to meet their informally agreed
upon level of service. However the business has not negotiated any additional formal agreements beyondthe standard customer terms. Which of the following is the BEST document that the company should
prepare to negotiate with the ISP?
Which of the following authentication services accomplishes this objective?
A company would like to implement two-factor authentication for its vulnerability management database
to require system administrators to use their token and random PIN codes. Which of the following
authentication services accomplishes this objective?
Which of the following is considered the MOST secure way to handle master keys associated with these certifica
A company has a corporate infrastructure where end users manage their own certificate keys. Which of
the following is considered the MOST secure way to handle master keys associated with these
certificates?
Which of the following controls would BEST mitigate this issue?
A recent audit has revealed that several users have retained permissions to systems they should no
longer have rights to after being promoted or changed job positions. Which of the following controls
would BEST mitigate this issue?
Which of the following BEST describes the company’s wireless network solution?
Ann a new security specialist is attempting to access the internet using the company’s open wireless
network. The wireless network is not encrypted: however, once associated, ANN cannot access the
internet or other company resources. In an attempt to troubleshoot, she scans the wireless network with
NMAP, discovering the only other device on the wireless network is a firewall. Which of the following
BEST describes the company’s wireless network solution?
Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities ass
Which of the following, if implemented, would improve security of remote users by reducing
vulnerabilities associated with data-in-transit?
Which of the following is considered an environmental control that can be deployed to meet this goal?
A company wants to improve its overall security posture by deploying environmental controls in its
datacenter. Which of the following is considered an environmental control that can be deployed to meet
this goal?
Which of the following should be used to accomplish this task?
A programmer must write a piece of code to encrypt passwords and credit card information used by an
online shopping cart. The passwords must be stored using one-way encryption, while credit card
information must be stored using reversible encryption. Which of the following should be used to
accomplish this task? (Select TWO)
Which of the following should the company implement?
A company needs to provide a secure backup mechanism for key storage in a PKI. Which of the following
should the company implement?
Which of the following supported list of ciphers MUST the security analyst disable?
A security analyst must ensure that the company’s web server will not negotiate weak ciphers with
connecting web browsers. Which of the following supported list of ciphers MUST the security analyst
disable? (Select THREE)