which of the following techniques supports availability?
When considering a vendor-specific vulnerability in critical industrial control systems which of the
following techniques supports availability?
Which of the following devices would be the MOST efficient way to filter external websites for staff on an int
Which of the following devices would be the MOST efficient way to filter external websites for staff on an
internal network?
which of the following security best practices?
A Human Resources user is issued a virtual desktop typically assigned to Accounting employees. A system
administrator wants to disable certain services and remove the local accounting groups installed by
default on this virtual machine. The system administrator is adhering to which of the following security
best practices?
Which of the following BEST addresses these requirements if the environment is concurrently shared by multiple
A security administrator wants to implement a solution which will allow some applications to run under
the user’s home directory and only have access to files stored within the same user’s folder, while other
applications have access to shared folders. Which of the following BEST addresses these requirements if
the environment is concurrently shared by multiple users?
Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on e
Which of the following should a company implement to BEST mitigate from zero-day malicious code
executing on employees’ computers?
a music application posting the name of the current song playing on the device on a social media site)?
Which of the following is a control that allows a mobile application to access and manipulate information
which should only be available by another application on the same mobile device (e.g. a music application
posting the name of the current song playing on the device on a social media site)?
Which of the following would provide the BEST environment for performing this testing?
Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety of
servers before deployment to the production environment while utilizing a limited amount of hardware
resources. Which of the following would provide the BEST environment for performing this testing?
which of the following?
Establishing a method to erase or clear cluster tips is an example of securing which of the following?
Which of the following should the administrator utilize to test for unidentified faults or memory leaks?
An application developer has tested some of the known exploits within a new application. Which of the
following should the administrator utilize to test for unidentified faults or memory leaks?
Which of the following controls should critical application servers implement to protect themselves from other
Which of the following controls should critical application servers implement to protect themselves from
other potentially compromised application services?