what she will do?
Ann, a security administrator, has been instructed to perform fuzz-based testing on the company’s applications.
Which of the following best describes what she will do?
Which of the following access control methodologies wou…
An audit has revealed that database administrators are also responsible for auditing database changes and backup logs. Which of the following access control
methodologies would BEST mitigate this concern?
Which of the following controls reduces the risk create…
A global gaming console manufacturer is launching a new gaming platform to its customers. Which of the following controls reduces the risk created by malicious
gaming customers attempting to circumvent control by way of modifying consoles?
Which of the following actions will help detect attacke…
An administrator thinks the UNIX systems may be compromised, but a review of system log files provides no useful information. After discussing the situation with
the security team, the administrator suspects that the attacker may be altering the log files and removing evidence of intrusion activity. Which of the following
actions will help detect attacker attempts to further alter log files?
Which of the following will most likely fix the uploadi…
An administrator has configured a new Linux server with the FTP service. Upon verifying that the service was configured correctly, the administrator has several
users test the FTP service. Users report that they are able to connect to the FTP service and download their personal files, however, they cannot transfer new files
to the server. Which of the following will most likely fix the uploading issue for the users?
Which of the following is the appropriate network struc…
Which of the following is the appropriate network structure used to protect servers and services that must be provided to external clients without completely
eliminating access for internal users?
Which of the following will the audit team most l likel…
During a third-party audit, it is determined that a member of the firewall team can request, approve, and implement a new rule-set on the firewall. Which of the
following will the audit team most l likely recommend during the audit out brief?
when should this problem best be revisited?
During a data breach cleanup, it is discovered that not all of the sites involved have the necessary data wiping tools. The necessary tools are quickly distributed to
the required technicians, but when should this problem best be revisited?
Which of the following is preventing the remote user fr…
A remote user (User1) is unable to reach a newly provisioned corporate windows workstation. The system administrator has been given the following log files from
the VPN, corporate firewall and workstation host.
Which of the following is preventing the remote user from being able to access the workstation?
Which of the following would enhance the security of ac…
Which of the following would enhance the security of accessing data stored in the cloud? (Select TWO)