Which of the following was implemented to detect this issue?
A one time security audit revealed that employees do not have the appropriate access to system
resources. The auditor is concerned with the fact that most of the accounts audited have unneeded
elevated permission to sensitive resources. Which of the following was implemented to detect this issue?
what feature of virtualization?
A security analyst has a sample of malicious software and needs to know what the sample in a carefully
controlled and monitored virtual machine to observe the software’s behavior. After the software has run,
the analyst returns the virtual machines OS to a pre-defined know good state using what feature of
virtualization?
Which of the following protocols should be used to this?
Joe, the chief technical officer (CTO) is concerned that the servers and network devices may not be able
to handle the growing needs of the company. He has asked his network engineer to being monitoring the
performance of these devices and present statistics to management for capacity planning. Which of the
following protocols should be used to this?
Which of the following device attributes was used to determine that the device was unauthorized?
A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the
corporate network. During a routine scan, the security administrator discovers an unauthorized device
belonging to a user in the marketing department. The user is using an android phone in order to browse
websites. Which of the following device attributes was used to determine that the device was
unauthorized?
Which of the following actions could have helped prevent the use of rainbow tables on the password hashes?
A website is breached, exposing the usernames and MD5 password hashes of its entire user base. Many
of these passwords are later cracked using rainbow tables. Which of the following actions could have
helped prevent the use of rainbow tables on the password hashes?
Which of the following protocols should be used to connect the device to the company SAN?
Joe a network administrator is setting up a virtualization host that has additional storage requirements.
Which of the following protocols should be used to connect the device to the company SAN? (Select Two)
Which of the following is the NEXT action to take in this scenario?
A security administrator finds that an intermediate CA within the company was recently breached. The
certificates held on this system were lost during the attack, and it is suspected that the attackers had full
access to the system. Which of the following is the NEXT action to take in this scenario?
Which the following controls would best mitigate this risk?
A recent online password audit has identified that stale accounts are at risk to brute force attacks. Which
the following controls would best mitigate this risk?
In this scenario, the file sent by the administrator is a:
The security administrator generates a key pair and sends one key inside a rest file to a third party. The
third party sends back a signed file. In this scenario, the file sent by the administrator is a:
Which of the following will allow Joe to configure a certificate for the firewall…?
Joe, a security technician, is configuring two new firewalls through the web on each. Each time Joe
connects, there is a warning message in the browser window about the certificate being untrusted.Which of the following will allow Joe to configure a certificate for the firewall so that firewall
administrators are able to connect both firewalls without experiencing the warning message?