The security administrator is determining the:
A set of standardized system images with a pre-defined set of applications is used to build end-user
workstations. The security administrator has scanned every workstation to create a current inventory of
all applications that are installed on active workstations and is documenting which applications are outof-date and could be exploited. The security administrator is determining the:
Which of the following does this describe?
On a train, an individual is watching a proprietary video on Joe’s laptop without his knowledge. Which of
the following does this describe?
Which of the following devices is used for the transparent security inspection of network…?
Which of the following devices is used for the transparent security inspection of network traffic by
redirecting user packets prior to sending the packets to the intended destination?
Which of the following BEST describes the compromised system?
An administrator is investigating a system that may potentially be compromised, and sees the following
log entries on the router.
*Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 3 packets.
*Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 6 packets.
*Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 8 packets.
Which of the following BEST describes the compromised system?
Which of the following BEST describes this attack?
The Chief Executive Officer (CEO) receives a suspicious voice mail warning of credit card fraud. No one
else received the voice mail. Which of the following BEST describes this attack?
Which of the following has the potential to cause the MOST amount of damage if the account was compromised?
An administrator was asked to review user accounts. Which of the following has the potential to cause
the MOST amount of damage if the account was compromised?
which of the following application attacks?
Failure to validate the size of a variable before writing it to memory could result in which of the following
application attacks?
Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organizati
During a disaster recovery planning session, a security administrator has been tasked with determining
which threats and vulnerabilities pose a risk to the organization. Which of the following should the
administrator rate as having the HIGHEST frequency of risk to the organization?
Which of the following is the FIRST step of action recommended in this scenario?
Company XYZ has encountered an increased amount of buffer overflow attacks. The programmer has
been tasked to identify the issue and report any findings. Which of the following is the FIRST step of
action recommended in this scenario?
Which of the following is a penetration testing method?
Which of the following is a penetration testing method?