Which of the following will occur if the certificate is allowed to expire?
A certificate used on an ecommerce web server is about to expire. Which of the following will occur if the
certificate is allowed to expire?
Which of the following files should be copied from srv4 to accomplish this?
An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate
*.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files
should be copied from srv4 to accomplish this?
Which of the following aspects of PKI BEST ensures the identity of the sender?
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the
message. Which of the following aspects of PKI BEST ensures the identity of the sender?
Which of the following would prevent her from denying accountability?
Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an
unintended group. Which of the following would prevent her from denying accountability?
Which of the following should be used to prevent this from occurring again?
A company recently experienced data loss when a server crashed due to a midday power outage.
Which of the following should be used to prevent this from occurring again?
Which of the following can Matt implement to ensure servers will withstand hardware failure?
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no
budget to accomplish his task. Which of the following can Matt implement to ensure servers will
withstand hardware failure?
Which of the following solutions would mitigate this issue?
After a company has standardized to a single operating system, not all servers are immune to a wellknown OS vulnerability. Which of the following solutions would mitigate this issue?
which of the following security controls?
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The
manager is concerned with which of the following security controls?
Which of the following would provide the IT department with the BEST solution?
A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of
a busy shopping mall. The company has experienced several laptop thefts from the cafe during peak
shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate
laptop theft. Which of the following would provide the IT department with the BEST solution?
Which of the following controls would BEST address this security concern?
A business has set up a Customer Service kiosk within a shopping mall. The location will be staffed by an
employee using a laptop during the mall business hours, but there are still concerns regarding the
physical safety of the equipment while it is not in use. Which of the following controls would BEST
address this security concern?