Which of the following should be used to implement voic…
Which of the following should be used to implement voice encryption?
Which of the following would further obscure the presen…
The SSID broadcast for a wireless router has been disabled but a network administrator notices that unauthorized users are accessing the wireless network. The
administrator has determined that attackers are still able to detect the presence of the wireless network despite the fact the SSID has been disabled. Which of the
following would further obscure the presence of the wireless network?
Which of the following is the strongest collision resis…
An administrator is testing the collision resistance of different hashing algorithms. Which of the following is the strongest collision resistance test?
Which of the following tools would aid her to decipher …
Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain \\. Which of the
following tools would aid her to decipher the network traffic?
Which of the following best describes the initial proce…
Which of the following best describes the initial processing phase used in mobile device forensics?
Which of the following is the best method for collectin…
A penetration testing is preparing for a client engagement in which the tester must provide data that proves and validates the scanning tools’ results. Which of the
following is the best method for collecting this information?
Which of the following uses of deduplication could be i…
The data backup window has expanded into the morning hours and has begun to affect production users. The main bottleneck in the process is the time it takes to
replicate the backups to separate servers at the offsite data center. Which of the following uses of deduplication could be implemented to reduce the backup
window?
Which of the following options meets all of these requi…
An organization is moving its human resources system to a cloud services provider. The company plans to continue using internal usernames and passwords with
the service provider, but the security manager does not want the service provider to have a company of the passwords. Which of the following options meets all of
these requirements?
Which of the following describes this type of attack?
An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those
packets back onto the network again, adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?
Which of the following is an appropriate control to use…
Joe, a technician, is working remotely with his company provided laptop at the coffee shop near his home. Joe is concerned that another patron of the coffee shop
may be trying to access his laptop. Which of the following is an appropriate control to use to prevent the other patron from accessing Joe’s laptop directly?