Which of the following would further obscure the presence of the wireless network?
The SSID broadcast for a wireless router has been disabled but a network administrator notices that
unauthorized users are accessing the wireless network. The administor has determined that attackers are
still able to detect the presence of the wireless network despite the fact the SSID has been disabled.
Which of the following would further obscure the presence of the wireless network?
Which of the following should be used to implement voice encryption?
Which of the following should be used to implement voice encryption?
which of the following?
During an application design, the development team specifics a LDAP module for single sign-on
communication with the company’s access control database. This is an example of which of the
following?
Which of the following should have been performed to ensure that employees have proper access?
After a merger, it was determined that several individuals could perform the tasks of a network
administrator in the merged organization. Which of the following should have been performed to ensure
that employees have proper access?
An annual audit of the business partner is conducted against the SLA in order to verify:
A company exchanges information with a business partner. An annual audit of the business partner is
conducted against the SLA in order to verify:
Which of the following is the proper way to quantify the total monetary damage resulting from an exploited vul
Which of the following is the proper way to quantify the total monetary damage resulting from an
exploited vulnerability?
Which of the following BEST describes this type of IDS?
A security administrator needs to implement a system that detects possible intrusions based upon a
vendor provided list. Which of the following BEST describes this type of IDS?
which of the following is the CSO most likely to reduce the number of incidents?
The chief Security Officer (CSO) has reported a rise in data loss but no break ins have occurred. By doing
which of the following is the CSO most likely to reduce the number of incidents?
when should this problem BEST be revisited?
During a data breach cleanup it is discovered that not all of the sites involved have the necessary data
wiping tools. The necessary tools are quickly distributed to the required technicians, but when should this
problem BEST be revisited?
which of the following should be taken into consideration when installing the new locks?
New magnetic locks were ordered for an entire building. In accordance with company policy, employee
safety is the top priority. In case of a fire where electricity is cut, which of the following should be taken
into consideration when installing the new locks?