Which of the following would BEST provide security betw…
A security administrator is seeking a secure way to send emails to a subcontractor without requiring user action. Which of the following would BEST provide security
between email gateways?
which of the following DNS properties should be changed…
An administrator must change the IP address of the corporate web server. Since this is a critical web server, downtime must be kept to a minimum. To minimize
downtime as much as possible, which of the following DNS properties should be changed well before the actual IP change?
Which of the following could be implemented?
Ann, a security administrator, needs to implement a transport encryption solution that will enable her to detect attempts to sniff packets. Which of the following could
be implemented?
Which of the following are user authentication factors …
A security administrator wants to implement a multi-factor, location-based authentication system. The authentication system must incorporate something unique
about each user. Which of the following are user authentication factors that can be used by the system? (Select THREE).
Which of the following should the employee use to trans…
An organization’s security policy requires secure file transfers to and from internal hosts. An employee is attempting to upload a file using an unsecure method to a
Linux-based dedicated file server and fails. Which of the following should the employee use to transfer the file?
Which of the following should the administrator investigate?
After a private key has been compromised, an administrator realized that downloading a CRL once per day was not effective. The administrator wants to
immediately revoke certificates. Which of the following should the administrator investigate?
Which of the following is a method of tracking attempts…
A network administrator discovers that telnet was enabled on the company’s Human Resources (HR) payroll server and that someone outside the HR subnet has
been attempting to log into the server. The network administrator has disabled telnet on the payroll server. Which of the following is a method of tracking attempts
to log onto telnet without exposing important telnet data.
Which of the following, if enabled, would confirm the a…
A security administrator is troubleshooting a network connectivity issue. The administrator believes that a router’s ACL may be blocking network traffic to a remote
network. Which of the following, if enabled, would confirm the administrator’s theory by providing helpful feedback?
Which of the following should a server administrator us…
A CA is attempting to publicize the acceptable parameters for certificate signing requests. Which of the following should a server administrator use to fulfill the
requirements of the CA?
Which of the following security goals is the company tr…
A company uses digital signatures to sign contracts. The company requires external entities to create an account with a third-party digital signature provider and
sign an agreement stating they will protect the account from unauthorized access. Which of the following security goals is the company trying to address in the
given scenario?