Which of the following reasons could have caused this port to be disabled?
A switch is set up to allow only 2 simultaneous MAC addresses per switch port. An administrator is
reviewing a log and determines that a switch ort has been deactivated in a conference room after it
detected 3 or more MAC addresses on the same port. Which of the following reasons could have caused
this port to be disabled?
Which of the following network controls would meet these requirements?
A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized
traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols. Which of
the following network controls would meet these requirements?
Which of the following most likely happened?
Client computers login at specified times to check and update antivirus definitions using a dedicated
account configured by the administrator. One day the clients are unable to login with the account, but
the server still responds to ping requests. The administrator has not made any changed. Which of the
following most likely happened?
Which of the following is the best way to collect this type of information?
In performing an authorized penetration test of an organization’s system security, a penetration tester
collects information pertaining to the application versions that reside on a server. Which of the following
is the best way to collect this type of information?
Which of the following ciphers should be chosen?
a company is deploying an new video conferencing system to be used by the executive team for board
meetings. The security engineer has been asked to choose the strongest available asymmetric cipher to
be used for encryption of board papers, and chose the strongest available stream cipher to be configured
for video streaming. Which of the following ciphers should be chosen? (Select two)
Which of the following best describes the incorporation of these elements?
Joe has hired several new security administrators and have been explaining the4 design of the company’s
network. He has described the position and descriptions of the company’s firewalls, IDS sensors, antivirus
server, DMZs, and HIPS. Which of the following best describes the incorporation of these elements?
Which of the following represents the MOST relevant technical security criteria for the MDM?
A security administrator is selecting an MDM solution for an organization, which has strict security
requirements for the confidentiality of its data on end user devices. The organization decides to allow
BYOD, but requires that users wishing to participate agree to the following specific device configurations;
camera disablement, password enforcement, and application whitelisting. The organization must be able
to support a device portfolio of differing mobile operating systems. Which of the following represents the
MOST relevant technical security criteria for the MDM?
A security administrator suspects that the users are the targets of:
Employees are reporting that they have been receiving a large number of emails advertising products and
services. Links in the email direct the users’ browsers to the websites for the items being offered. No
reports of increased virus activity have been observed. A security administrator suspects that the users
are the targets of:
This is an example of:
An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation
to determine who owns the drive. When the drive is inserted, a command prompt opens and a script
begins to run. The employee notifies a technician who determines that data on a server have been
compromised. This is an example of:
Which of the following controls would be MOST appropriate in this scenario?
A chief information officer (CIO) is concerned about PII contained in the organization’s various data
warehouse platforms. Since not all of the PII transferred to the organization is required for proper
operation of the data warehouse application, the CIO requests the in needed PII data be parsed and
securely discarded. Which of the following controls would be MOST appropriate in this scenario?