Which of the following is an important step in the initial stages of deploying a host-based firewall?
Which of the following is an important step in the initial stages of deploying a host-based firewall?
Which of the following MOST interferes with network-based detection techniques?
Which of the following MOST interferes with network-based detection techniques?
Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?
Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the
company’s financial records. Which of the following security mechanism would be MOST appropriate to
confirm Joe’s suspicion?
Which of the following devices will help prevent a laptop from being removed from a certain location?
Which of the following devices will help prevent a laptop from being removed from a certain location?
Which of the following can be used as an equipment theft deterrent?
Which of the following can be used as an equipment theft deterrent?
Which of the following would be the MOST appropriate?
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the
following would be the MOST appropriate? (Select TWO).
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the computer
and finds that a service called Telnet is running and connecting to an external website over port 443. This
Telnet service was found by comparing the system’s services to the list of standard services on the
company’s system image. This review process depends on:
which of the following practices?
Identifying a list of all approved software on a system is a step in which of the following practices?
Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is
used by several employees.
Which of the following is the BEST approach for implementation of the new application on the virtual
server?
Which of the following security techniques is MOST appropriate to do this?
The information security technician wants to ensure security controls are deployed and functioning as
intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?