Which of the following is the BEST recommendation for t…
A web administrator has just implemented a new web server to be placed in production. As part of the company’s security plan, any new system must go through a
security test before it is placed in production. The security team runs a port scan resulting in the following data:
21 tcp open FTP
23 tcp open Telnet
22 tcp open SSH
25 UDP open smtp
110 tcp open pop3
443 tcp open https
Which of the following is the BEST recommendation for the web administrator?
Which of the following types of testing will the penetr…
A company hires a penetration testing team to test its overall security posture. The organization has not disclosed any information to the penetration testing team
and has allocated five days for testing. Which of the following types of testing will the penetration testing team have to conduct?
Which of the following would best mitigate this issue?
Users in an organization are experiencing when attempting to access certain websites. The users report that when they type in a legitimate URL, different boxes
appear on the screen, making it difficult to access the legitimate sites. Which of the following would best mitigate this issue?
Which of the following would be used to demonstrate the…
A company has recently begun to provide internal security awareness for employees. Which of the following would be used to demonstrate the effectiveness of the
training?
This feature is called:
A load balancer has the ability to remember which server a particular client is using and always directs that client to the same server. This feature is called:
Which of the following forms of software testing can be…
Which of the following forms of software testing can best be performed with no knowledge of how a system is internally structured or functions? (Select Two.)
Which of the following describes the implementation of PAT?
Which of the following describes the implementation of PAT?
Which of the following allows wireless use while mitiga…
In the course of troubleshooting wireless issues from users a technician discovers that users are connecting to their home SSIDs which the technician scans but
detects none of these SSIDs. The technician eventually discovers a rouge access point that spoofs any SSID request. Which of the following allows wireless use
while mitigating this type of attack?
Which of the following reasons make this effective?
An attacker impersonates a fire marshal and demands access to the datacenter under the threat of a fine. Which of the following reasons make this effective?
(Select two.)
Which of the following, when implemented and configured…
The chief information officer (CIO) of a major company intends to increase employee connectivity and productivity by issuing employees mobile devices with access
to their enterprise email, calendar, and contacts. The solution the CIO intends to use requires a PKI that automates the enrollment of mobile device certificates.
Which of the following, when implemented and configured securely, will meet the CIO’s requirement?