Which of the following rules is necessary to support this implementation?
A system administrator is implementing a firewall ACL to block specific communication to and from a
predefined list of IP addresses, while allowing all other communication. Which of the following rules is
necessary to support this implementation?
Which of the following concepts should be considered to help ensure data security?
Joe a system architect wants to implement appropriate solutions to secure the company’s distributed
database. Which of the following concepts should be considered to help ensure data security? (Select
TWO)
Which of the following should be selected?
A forensics analyst is tasked identifying identical files on a hard drive. Due to the large number of files to
be compared, the analyst must use an algorithm that is known to have the lowest collision rate. Which of
the following should be selected?
Which of the following technologies will enforce protections on these systems to prevent files and services fr
A government agency wants to ensure that the systems they use have been deployed as security as
possible. Which of the following technologies will enforce protections on these systems to prevent files
and services from operating outside of a strict rule set?
Which of the following Best describes this occurrence?
An organization receives an email that provides instruction on how to protect a system from being a
target of new malware that is rapidly infecting systems. The incident response team investigates the
notification and determines it to invalid and notifies users to disregard the email. Which of the following
Best describes this occurrence?
Which of the following should have been done first?
Joe an employee has reported to Ann a network technician an unusual device plugged into a USB port on
a workstation in the call center. Ann unplugs the workstation and brings it to the IT department where an
incident is opened. Which of the following should have been done first?
Which of the following should be used to meet the requirement?
A company is implementing a system to transfer direct deposit information to a financial institution. One
of the requirements is that the financial institution must be certain that the deposit amounts within the
file have not been changed. Which of the following should be used to meet the requirement?
which of the following?
An organization uses a Kerberos-based LDAP service for network authentication. The service is also
utilized for internal web applications. Finally access to terminal applications is achieved using the same
authentication method by joining the legacy system to the Kerberos realm. This company is using
Kerberos to achieve which of the following?
Which of the following can be implemented to reduce the risk of this information becoming compromised in this
A recent audit has revealed that all employees in the bookkeeping department have access to
confidential payroll information, while only two members of the bookkeeping department have job duties
that require access to the confidential information. Which of the following can be implemented to reduce
the risk of this information becoming compromised in this scenario? (Select TWO)
Which of the following methods will be effective for this purpose?
A Chief Executive Officer (CEO) is steering company towards cloud computing. The CEO is requesting a
federated sign-on method to have users sign into the sales application. Which of the following methods
will be effective for this purpose?