Which of the following MOST likely describes the server?
A security administrator runs a port scan against a server and determines that the following ports are open:
TCP 22
TCP 25
TCP 80
TCP 631
TCP 995
Which of the following MOST likely describes the server?
Which of the following steps should the CIO and his sta…
A Chief Information Office (CIO) is working with his staff to develop a contingency plan for the organization. Which of the following steps should the CIO and his
staff to take FIRST?
To best protect against unauthorized data sharing they …
Two companies are partnering to bid on a contract. Normally these companies are fierce competitors but for this procurement they have determined that a
partnership is the only way they can win the job. Each company is concerned about unauthorized data sharing and wants to ensure other divisions within each
company will not have access to proprietary data. To best protect against unauthorized data sharing they should each sign a(n):
Which of the following attacks is being leveraged?
An attacker is attempting to exploit the username field of an application. The exploitation involves writing more data than the field variable is initialized for. Which of
the following attacks is being leveraged?
Which of the following would BEST meet this goal?
A security administrator wishes to monitor incoming traffic to the mail server with minimal risk of disruption of services and functions. Which of the following would
BEST meet this goal?
Which of the following technologies would be MOST effec…
The operations manager for a sales group wants to ensure that sales personnel are able to use their laptops and other portable devices throughout a building using
both wireless and wired connectivity. Which of the following technologies would be MOST effective at increasing security of the network while still maintaining the
level of accessibility the operations manager requested?
Which of the following should be implemented to prevent…
The network administrator sees a “%CAM-TABLE-FULL” message on a network switch. Upon investigation, the administrator notices thousands of MAC addresses
associated with a single untagged port. Which of the following should be implemented to prevent this type of attack?
Which of the following has the security administrator i…
A security administrator has implemented a series of computers to research possible intrusions into the organizational network, and to determine the motives as
well as the tool used by malicious entities. Which of the following has the security administrator implemented?
Which of the following best describes this hidden account?
A programmer sets up a hidden account within a program to track users’ personal information and habits. The programmer then uses this information to send
targeted email messages to users. Which of the following best describes this hidden account?
Which of the following types of malware can avoid detec…
Which of the following types of malware can avoid detection by an antivirus system with up-to-date signatures?