Which of the following MUST happen before the server can communicate on VLAN 12?
A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication works fine,
but VLAN 12 does not. Which of the following MUST happen before the server can communicate on VLAN
12?
Three of the primary security control types that can be implemented are.
Three of the primary security control types that can be implemented are.
which applications a user can install and run on a company issued mobile device?
Which of the following technical controls is BEST used to define which applications a user can install and
run on a company issued mobile device?
Which of the following controls is being described in this situation?
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock
the PC after five minutes of inactivity. Which of the following controls is being described in this situation?
Which of the following is a management control?
Which of the following is a management control?
Which of the following can result in significant administrative overhead from incorrect reporting?
Which of the following can result in significant administrative overhead from incorrect reporting?
Which of the following describes this cause?
A vulnerability scan is reporting that patches are missing on a server. After a review, it is determined that
the application requiring the patch does not exist on the operating system.
Which of the following describes this cause?
Which of the following BEST describes these results?
Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast
packets from the switches on the network. After investigation, she discovers that this is normal activity
for her network. Which of the following BEST describes these results?
Which of the following is an example of a false negative?
Which of the following is an example of a false negative?
Which of the following administrative controls should be implemented to BEST achieve this?
A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff
who intentionally access the server via Telnet and illegally tamper with customer data. Which of the
following administrative controls should be implemented to BEST achieve this?