Which of the following would the security administrator…
A security administrator has been asked to assist with the identification of a BYOD design that will ensure corporate data can be managed and monitored separately
from personal data. Which of the following would the security administrator recommend?
Which of the following should the engineer send to the …
A security engineer wants to communicate securely with a third party using PGP. Which of the following should the engineer send to the third party to enable the
third party to securely encrypt email replies?
Which of the following tasks should the security admini…
A security administrator is reviewing the event logs of the company server. There are numerous entries for attempts to log into the telnet service with an account
named “root.” After further review of the access to the server the security administrator determines that there is a business need for another server in the company
via telnet to the server under review. Which of the following tasks should the security administrator perform to improve the security posture of the server? (Select
TWO).
Which of the following would eliminate Ann’s excuse in …
Several customers received an email from an employee that advertised better rates at a different company. Shortly after the email was sent, Ann, the employee
who sent the email, resigned and joined the other company. When confronted, Ann claimed that she did not send the email, it was another person spoofing her
email address. Which of the following would eliminate Ann’s excuse in the future?
Which of the following BEST identifies the stage of inc…
A company was recently the victim of a major attack which resulted in significant reputational loss. Joe a member of the company incident response team is
currently reviewing Standard Operating Procedures for the team in the wake of the attack. Which of the following BEST identifies the stage of incident response that
Joe is in?
Which of the following would be the MOST efficient meth…
A systems administrator is working with a third party to establish the automated transfer of large amounts of proprietary data. The interface will need to use secured
credentials and the transmission will consist of data that has been encrypted prior to transit and needs no additional protection. Which of the following would be the
MOST efficient method of data transmission given the established requirements?
Which of the following would be the BEST control to imp…
A company wants to be made aware of anyone who enters onto their property. Which of the following would be the BEST control to implement?
Which of the following can the employee perform if the …
A company has hired a an ex-employee to perform a penetration test of the company’s proprietary application. Although the ex-employee used to be part of the
development team, the application has gone through some changes since the employee left. Which of the following can the employee perform if the company is not
willing to release any information to the ex-employee?
Which of the following can be used to standardize and e…
During a recent vulnerability assessment the penetration testers were able to successfully crack a large number of employee passwords. The company technology
use agreement clearly states that passwords used on the company network must be at least eight characters long and contain at least one uppercase letter and
special character. Which of the following can be used to standardize and enforce the password complexity rules across the entire organization to resolve the issue?
Which of the following actions is appropriate for the website administrator to…
A high traffic website is experiencing numerous brute force attacks against its user base. The attackers are using a very large botnet to carry out the attack. As a
result, many users passwords are being compromised Which of the following actions is appropriate for the website administrator to take in order to reduce the
threat from this type of attack in the future. .