Which of the following can affect electrostatic dischar…
Which of the following can affect electrostatic discharge in a network operations center?
Which of the following is a feature that is UNIQUE to K…
A security administrator is evaluating three different services: Radius, Diameter, and Kerberos. Which of the following is a feature that is UNIQUE to Kerberos?
Which of the following is an encryption algorithm that …
A security administrator has been asked to implement a VPN that will support remote access over IPsec Which of the following is an encryption algorithm that
would meet this requirement?
Which of the following is commonly used for federated i…
Which of the following is commonly used for federated identity management across multiple organizations?
which of the following?
The process of applying a salt and cryptographic hash to a password then repeating the process many times is known as which of the following?
Which of the following controls can be implemented to m…
Joe a website administrator believes he owns the intellectual property for a company invention and has been replacing image files on the company’s public facing
website in the DMZ. Joe is using steganography to hide stolen data. Which of the following controls can be implemented to mitigate this type of inside threat?
Which of the following capabilities would be MOST appro…
An information system owner has supplied a new requirement to the development team that calls for increased non-repudiation within the application. After
undergoing several audits, the owner determined that current levels of non-repudiation were insufficient. Which of the following capabilities would be MOST
appropriate to consider implementing is response to the new requirement?
Which of the following can be implemented to enable use…
Two users need to securely share encrypted files via email. Company policy prohibits users from sharing credentials or exchanging encryption keys. Which of the
following can be implemented to enable users to share encrypted data while abiding by company policies?
Which of the following technical control should Joe put…
Joe notices there are several user accounts on the local network generating spam with embedded malicious code. Which of the following technical control should
Joe put in place to BEST reduce these incidents?
Which of the following should the organization implemen…
A new security policy in an organization requires that all file transfers within the organization be completed using applications that provide secure transfer. Currently,
the organization uses FTP and HTTP to transfer files. Which of the following should the organization implement in order to be compliant with the new policy?