which of the following security concepts will most effectively address the finding?
While preparing for an audit a security analyst is reviewing the various controls in place to secure the
operation of financial processes within the organization. Based on the pre assessment report, the
department does not effectively maintain a strong financial transaction control environment due to
conflicting responsibilities held by key personnel. If implemented, which of the following security
concepts will most effectively address the finding?
Which of the following would be the best option?
A chief privacy officer, Joe, is concerned that employees are sending emails to addresses outside of the
company that contain PII. He asks that the security technician to implement technology that will mitigate
this risk. Which of the following would be the best option?
Which of the following technologies can provide protection for the PKI’s escrowed keys?
The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
Which of the following are unique to white box testing methodologies?
Which of the following are unique to white box testing methodologies? (Select two)
Which of the following should the technician do to resolve the connectivity problem?
A technician installed two ground plane antennae on 802.11n bridges connecting two buildings 500 feet
apart. After configuring both radios to work at 2.4ghz and implementing the correct configuration,
connectivity tests between the two buildings are unsuccessful. Which of the following should the
technician do to resolve the connectivity problem?
Which of the following should be implemented to help prevent similar incidents in the future?
incidents occurred on systems with older software on development workstations. Which of the following
should be implemented to help prevent similar incidents in the future?
Which of the following should have been implemented on the router to prevent this attack?
A router was shut down as a result of a DoS attack. Upon review of the router logs, it was determined
that the attacker was able to connect to the router using a console cable to complete the attack. Which
of the following should have been implemented on the router to prevent this attack? (Select two)
Which of the following is the name for the access control methodology used?
by the department manager, and read only for the individual employee. Which of the following is the
name for the access control methodology used?
Which of the following are cryptography concepts that should be used to identify the allowed programs?
An administrator is implementing a security control that only permits the execution of allowed programs.
Which of the following are cryptography concepts that should be used to identify the allowed programs?
(Select two.)
Which of the following commands can be used to see processes that are listening on a TCP port?
While responding to an incident on a Linux server, the administrator needs to disable unused services.
Which of the following commands can be used to see processes that are listening on a TCP port?