Which of the following access control methodologies would BEST mitigate this concern?
An audit has revealed that database administrators are also responsible for auditing database changes
and backup logs. Which of the following access control methodologies would BEST mitigate this concern?
what she will do?
Ann, a security administrator, has been instructed to perform fuzz-based testing on the company’s
applications. Which of the following best describes what she will do?
Which of the following is an appropriate control to use to prevent the other patron from accessing Joe’s lap
Joe, a technician, is working remotely with his company provided laptop at the coffee shop near his
home. Joe is concerned that another patron of the coffee shop may be trying to access his laptop. Which
of the following is an appropriate control to use to prevent the other patron from accessing Joe’s laptop
directly?
Which of the following describes this type of attack?
An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The
attacker then user a function of the sniffer to push those packets back onto the network again, adding
another $20 to the gift card. This can be done many times. Which of the following describes this type of
attack?
Which of the following options meets all of these requirements?
An organization is moving its human resources system to a cloud services provider. The company plans to
continue using internal usernames and passwords with the service provider, but the security manager
does not want the service provider to have a company of the passwords. Which of the following options
meets all of these requirements?
Which of the following uses of deduplication could be implemented to reduce the backup window?
The data backup window has expanded into the morning hours and has begun to affect production users.
The main bottleneck in the process is the time it takes to replicate the backups to separate severs at the
offsite data center. Which of the following uses of deduplication could be implemented to reduce the
backup window?
Which of the following is the best method for collecting this information?
A penetration testing is preparing for a client engagement in which the tester must provide data that
proves and validates the scanning tools’ results. Which of the following is the best method for collecting
this information?
Which of the following best describes the initial processing phase used in mobile device forensics?
Which of the following best describes the initial processing phase used in mobile device forensics?
Which of the following tools would aid her to decipher the network traffic?
Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal
host to a suspicious call back domain \\. Which of the following tools would aid her to decipher the
network traffic?
Which of the following is the strongest collision resistance test?
An administrator is testing the collision resistance of different hashing algorithms. Which of the following
is the strongest collision resistance test?