Which of the following has been performed against the d…
A security analyst has been asked to perform penetration testing against a web application being deployed for the first time. When performing the test the
application stops responding and returns an error referring to failed database connections. Upon further investigation, the analyst finds the database server was
inundated with commits which exhausted available space on the volume. Which of the following has been performed against the database server?
Which of the following allows an application to securel…
Which of the following allows an application to securely authenticate a user by receiving credentials from a remote web domain?
Which of the following security methods should Ann sugg…
Ann is preparing a presentation for management to highlight some of the issues the security department is facing trying to integrate the organizations BYOD policy.
Highest of her list is the transparency of network resources. The DAC environment includes several departments including payroll, HR, IT, and Management.
However, the small company’s structure has never been updated to incorporate these departments. The organization continued to add users based on the same
original general user profile. Which of the following security methods should Ann suggest to management to BEST fix this issue?
Which of the following would prevent students from usin…
A university police department is housed on the first floor of a student dormitory. Which of the following would prevent students from using ARP spoofing attacks
against computers at the police department?
Which of the following is the BEST solution?
The CEO for company A has asked the security engineer to design a PKI for company A. The CEO has asked that it allow company A users to send signed and
encrypted emails to company B. The users from company B must have an inherent trust in certificates from company A, because the security policy of company B
disallows adding of new CAs to their trusted root container. Which of the following is the BEST solution?
Which of the following can cause this scenario?
A security administrator is called to troubleshoot a computer infection. The computer’s software correctly identified the malware and flagged it to the central
management console; however the malicious payload was still executed. Which of the following can cause this scenario?
which of the following?
Am organization decides to implement a BYOD policy but wants to ensure they address requirements associated with any legal investigations and controls needed
to comply with the analysis and recreation of an incident. This concern is also known as which of the following?
Which of the following actions would BEST interrupt the…
A security administrator is having continued issues with malware variants infecting systems infecting systems and encrypting several types of files. The malware
uses a document macro to create a randomly named executable that downloads the encrypted payload of the malware. Once downloaded, the malware searches
all drives, creates and HTML file with the decryption instructions in the directory, and then proceeds to encrypt the target files. Which of the following actions would
BEST interrupt the malware before it encrypts other files while minimizing the adverse impacts to the users?
Which of the following cipher suites should the adminis…
A media company would like to securely stream live video feeds over the Internet to clients. The security administrator suggests that the video feed is encrypted in
transport and configures the web server to prefer ciphers suited to the live video feeds. Which of the following cipher suites should the administrator implement on
the web server to minimize the computational and performance overhead of delivering live feeds?
Which of the following is the BEST course of action to …
Several users require administrative access for software compatibility reasons. Over time, these users have made several changes to important system settings.
Which of the following is the BEST course of action to ensure the system settings are properly enforced?