Which of the following settings must be configured?
A system administrator must configure the company’s authentication system to ensure that users will be unable to reuse the last ten passwords within a six months
period. Which of the following settings must be configured? (Select Two)
Which of the following commands can be used to see proc…
While responding to an incident on a new Windows server, the administrator needs to disable unused services. Which of the following commands can be used to
see processes that are listening on a TCP port?
Which of the following is a proprietary protocol common…
Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
Virtualization that allows an operating system kernel t…
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is called:
Which of the following job roles should receive trainin…
A security manager is preparing the training portion of an incident plan. Which of the following job roles should receive training on forensics, chain of custody, and
the order of volatility?
Which of the following attacks may be occurring?
After disabling SSID broadcast, a network administrator still sees the wireless network listed in available networks on a client laptop. Which of the following attacks
may be occurring?
Which of the following would have prevented the network…
A network was down for several hours due to a contractor entering the premises and plugging both ends of a network cable into adjacent network jacks. Which of
the following would have prevented the network outage? (Select Two)
This is an example of:
During a code review a software developer discovers a security risk that may result in hundreds of hours of rework. The security team has classified these issues as
low risk. Executive management has decided that the code will not be rewritten. This is an example of:
Which of the following would BEST satisfy these require…
A developer needs to utilize AES encryption in an application but requires the speed of encryption and decryption to be as fast as possible. The data that will be
secured is not sensitive so speed is valued over encryption complexity. Which of the following would BEST satisfy these requirements?
Which of the following actions should be performed?
An administrator needs to protect against downgrade attacks due to various vulnerabilities in SSL/TLS. Which of the following actions should be performed? (Select
TWO)