This is an example of:
An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation to determine who owns the drive. When the drive is
inserted, a command prompt opens and a script begins to run. The employee notifies a technician who determines that data on a server have been compromised.
This is an example of:
A security administrator suspects that the users are th…
Employees are reporting that they have been receiving a large number of emails advertising products and services. Links in the email direct the users’ browsers to
the websites for the items being offered. No reports of increased virus activity have been observed. A security administrator suspects that the users are the targets
of:
Which of the following represents the MOST relevant tec…
A security administrator is selecting an MDM solution for an organization, which has strict security requirements for the confidentiality of its data on end user
devices. The organization decides to allow BYOD, but requires that users wishing to participate agree to the following specific device configurations; camera
disablement, password enforcement, and application whitelisting. The organization must be able to support a device portfolio of differing mobile operating systems.
Which of the following represents the MOST relevant technical security criteria for the MDM?
Which of the following best describes the incorporation…
Joe has hired several new security administrators and have been explaining the design of the company’s network. He has described the position and descriptions of
the company’s firewalls, IDS sensors, antivirus server, DMZs, and HIPS. Which of the following best describes the incorporation of these elements?
Which of the following ciphers should be chosen?
a company is deploying an new video conferencing system to be used by the executive team for board meetings. The security engineer has been asked to choose
the strongest available asymmetric cipher to be used for encryption of board papers, and chose the strongest available stream cipher to be configured for video
streaming. Which of the following ciphers should be chosen? (Select two)
Which of the following is the best way to collect this …
In performing an authorized penetration test of an organization’s system security, a penetration tester collects information pertaining to the application versions that
reside on a server. Which of the following is the best way to collect this type of information?
Which of the following most likely happened?
Client computers login at specified times to check and update antivirus definitions using a dedicated account configured by the administrator. One day the clients
are unable to login with the account, but the server still responds to ping requests. The administrator has not made any changed. Which of the following most likely
happened?
Which of the following network controls would meet thes…
A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for
a number of TCP and UDP protocols. Which of the following network controls would meet these requirements?
Which of the following reasons could have caused this p…
A switch is set up to allow only 2 simultaneous MAC addresses per switch port. An administrator is reviewing a log and determines that a switch port has been
deactivated in a conference room after it detected 3 or more MAC addresses on the same port. Which of the following reasons could have caused this port to be
disabled?
Which of the following would be the best choice to impl…
During a recent audit, the auditors cited the company’s current virtual machine infrastructure as a concern. The auditors cited the fact that servers containing
sensitive customer information reside on the same physical host as numerous virtual machines that follow less stringent security guild lines. Which of the following
would be the best choice to implement to address this audit concern while maintain the current infrastructure?