Which the following would verify that a threat does exist and security controls can easily be bypassed without
Which the following would verify that a threat does exist and security controls can easily be bypassed
without actively testing an application?
when testing a new software patch before a company-wide deplyment?
When of the following technologies would be MOST appropriate to utilize when testing a new software
patch before a company-wide deplyment?
Which of the following protocols should be used?
A system administrator needs to implement 802.1x whereby when user logs into the network, the
authentication server communicates to the network switch and assigns the user to the proper VLAN.
Which of the following protocols should be used?
Which of the following technologies would BEST be suited to accomplish this?
A Security technician would like that to obscure sensitive data within a file so that can be transferred
without causing suspicion. Which of the following technologies would BEST be suited to accomplish this?
Which of the following risk mitigation startegies should have been implemented when the supervisor was demoted
A supervisor in your organization was demoted on Friday afternoon. The supervisor had the ability to
modify the contents of a confidential database, as well as other managerial permissions. On Monday
morning, the database administrator reported that log files indicated that several records were missing
from the database. Which of the following risk mitigation startegies should have been implemented
when the supervisor was demoted?
Which of the following attack types is being carried out where a target is being sent unsolicited messages via
Which of the following attack types is being carried out where a target is being sent unsolicited messages
via Bluetooth?
Which of the following would explain the situation?
Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe
receives a response, he is unable to decrypt the response with the same key he used initially. Which of
the following would explain the situation?
Which of the following principles of social engineering mad attack successful?
Recently several employees were victims of a phishing email that appeared to originate from the
company president. The email claimed the employees would be disciplined if they did not click on a
malicious link in the message. Which of the following principles of social engineering mad attack
successful?
Which of the following is the LEAST secure hashing algorithm?
Which of the following is the LEAST secure hashing algorithm?
which of the of the following security exposures would this lead to?
An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the of the
following security exposures would this lead to?