Which of the following is important to reduce risk?
Which of the following is important to reduce risk?
Which of the following does this represent?
A database server has been compromised. A local user logged into the console and exploited a vulnerability caused by a missing operating system patch to get a
system level command shell. Which of the following does this represent?
Which of the following could be utilized to notify the …
Recently, the desktop support group has been performing a hardware refresh and has replaced numerous computers. An auditor discovered that a number of the
new computers did not have the company’s antivirus software installed on them. Which of the following could be utilized to notify the network support group when
computers without the antivirus software are added to the network?
Which of the following should the administrator do to p…
A security administrator determined that users within the company are installing unapproved software. Company policy dictates that only certain applications may be
installed or ran on the user’s computer without exception. Which of the following should the administrator do to prevent all unapproved software from running on the
user’s computer?
Which of the following has the administrator been taske…
A security administrator is tasked with conducting an assessment made to establish the baseline security posture of the corporate IT infrastructure. The
assessment must report actual flaws and weaknesses in the infrastructure. Due to the expense of hiring outside consultants, the testing must be performed using
in-house or cheaply available resources. There cannot be a possibility of any equipment being damaged in the test. Which of the following has the administrator
been tasked to perform?
Which of the following should the administrator do to r…
A company utilizes a copier on the finance subnet. The security administrator is worried that the copier could have undisclosed vulnerabilities, as it has an
embedded operating system that can not be maintained. Which of the following should the administrator do to reduce the attack surface of the copier?
How can the network administrator BEST aggregate the lo…
A network administrator recently implemented two caching proxy servers on the network. How can the network administrator BEST aggregate the log files for the
proxy servers?
Which of the following parts of the incident response p…
A major breach occurred at an organization. The incident response team contained the breach and recovered from the incident. A number of things were wrong
during the incident response process and now the team must discuss and correct these items. Which of the following parts of the incident response process is the
team conducting?
Which of the following can be implemented to enable suc…
A company wants to ensure that all software executing on a corporate server has been authorized to do so by a central control point. Which of the following can be
implemented to enable such control.
Which of the following would provide the BEST encryptio…
A single server hosts a sensitive SQL-based database and a web service containing static content. A few of the database fields need to be encrypted due to
regulatory requirements. Which of the following would provide the BEST encryption solution for this particular server?