Which of the following technologies would be MOST effec…
The operations manager for a sales group wants to ensure that sales personnel are able to use their laptops and other portable devices throughout a building using
both wireless and wired connectivity. Which of the following technologies would be MOST effective at increasing security of the network while still maintaining the
level of accessibility the operations manager requested?
Which of the following should be implemented to prevent…
The network administrator sees a “%CAM-TABLE-FULL” message on a network switch. Upon investigation, the administrator notices thousands of MAC addresses
associated with a single untagged port. Which of the following should be implemented to prevent this type of attack?
Which of the following has the security administrator i…
A security administrator has implemented a series of computers to research possible intrusions into the organizational network, and to determine the motives as
well as the tool used by malicious entities. Which of the following has the security administrator implemented?
Which of the following best describes this hidden account?
A programmer sets up a hidden account within a program to track users’ personal information and habits. The programmer then uses this information to send
targeted email messages to users. Which of the following best describes this hidden account?
Which of the following types of malware can avoid detec…
Which of the following types of malware can avoid detection by an antivirus system with up-to-date signatures?
Which of the following principles of social engineering…
An auditor is conducting a security audit and contacts the service desk at the target organization pretending to be a peer of the service desk employee. After
engaging the employee in small talk, the auditor reports getting locked out of the organization’s webmail system and requests that the employee reset the webmail
password. Which of the following principles of social engineering is the auditor attempting to leverage in this attempted attack?
Which of the following are BEST used in the process of …
Which of the following are BEST used in the process of hardening a public facing web server? (Select TWO)
Which of the following should the engineer send to the …
A security engineer wants to communicate securely with a third party via email using PGP. Which of the following should the engineer send to the third party to
enable the third party to securely encrypt email replies?
http://www.documents-portal.com/editdoc.php?document1=t…
An auditor is reviewing the following logs from the company’s proxy server used to store both sensitive and public documents. The documents are edited via a client
web interface and all processing is performed on the server side.
http://www.documents-portal.com/editdoc.php?document1=this%20is%20the%20content%20of%20document1
http://www.documents-portal.com/editdoc.php?document2=this%20is%20the%20content%20of%20document2
http://www.documents-portal.com/editdoc.php?document3=this%20is%20the%20content%20of%20document3
To remediate the finding, the organization implemented:
During an audit of a software development organization, an auditor found that the organization did not properly follow industry best practices including peer review
and board approval prior to moving applications into the production environment. The auditor recommended adapting a formal process incorporating these steps.
To remediate the finding, the organization implemented: