Which of the following solutions should the administrat…
A network administrator would like to implement a wireless solution that uses a very high performance stream cipher encryption protocol. Which of the following
solutions should the administrator implement to meet this goal?
Which of the following controls should the application …
An outside testing company performing black box testing against a new application determines that it is possible to enter any characters into the application’s webbased form. Which of the following controls should the application developers use to prevent this from occurring?
Which of the following should the security manager impl…
A security manager is required to protect the disclosure of sensitive data stored on laptops and mobile devices while users are traveling. Users are required to
connect via VPN to the company’s network and are also issued cable locks. Which of the following should the security manager implement to further secure the
data? (Select TWO).
which of the following technologies is MOST effective f…
Usage of which of the following technologies is MOST effective for any removable storage device, such as hard drives and flash drives, in an organization to help
prevent data loss or theft?
Which of the following would BEST meet this goal?
An organization’s security policy requires that data be available in case of a natural disaster. Which of the following would BEST meet this goal?
Which of the following types of attacks are MOST likely…
Which of the following types of attacks are MOST likely to be successful when using fuzzing against an executable program? (Select TWO).
Which of the following will allow the company to achiev…
A company needs to ensure that employees that are on vacation or leave cannot access network resources, while still retaining the ability to receive emails in their
inboxes. Which of the following will allow the company to achieve this goal?
Which of the following are security reasons for this design?
A security administrator creates separate VLANs for employee devices and HVAC equipment that is network attached. Which of the following are security reasons
for this design? (Select THREE).
Which of the following attack types is this?
Ann, a recently terminated programmer, can access the program she wrote without using any login credentials. Which of the following attack types is this?
Which of the following are valid security concepts that…
A company is providing mobile devices to all employees. The system administrator has been tasked with providing input for the company’s new mobile device
policy. Which of the following are valid security concepts that the system administrator should include when offering feedback to management? (Select TWO)