which of the following Incident Response procedures?
The first responder to an incident has been asked to provide an after action report. This supports which of the following Incident Response procedures?
which of the following controls could the security admi…
A security administrator wishes to ensure that one file in a confidential location is not altered. With very limited technology or restrictions to the file or folder, which of
the following controls could the security administrator use to determine if the file has been altered?
Which of the following should Joe enable on his worksta…
Joe, a user, wants to configure his workstation to make certain that the certificate he receives when connecting to websites is still valid. Which of the following
should Joe enable on his workstation to achieve this?
Which of the following network configurations provides …
Which of the following network configurations provides security analysts with the MOST information regarding threats, while minimizing the risk to internal corporate
assets?
Which of the following did the administrator forget to do?
An administrator is tasked with reducing the malware infection rate of PC applications. To accomplish this, the administrator restricts the locations from which
programs can be launched. After this is complete, the administrator notices that malware continues to run from locations on the disk and infect the hosts. Which of
the following did the administrator forget to do?
Which of the following solutions should the administrat…
A network administrator would like to implement a wireless solution that uses a very high performance stream cipher encryption protocol. Which of the following
solutions should the administrator implement to meet this goal?
Which of the following controls should the application …
An outside testing company performing black box testing against a new application determines that it is possible to enter any characters into the application’s webbased form. Which of the following controls should the application developers use to prevent this from occurring?
Which of the following should the security manager impl…
A security manager is required to protect the disclosure of sensitive data stored on laptops and mobile devices while users are traveling. Users are required to
connect via VPN to the company’s network and are also issued cable locks. Which of the following should the security manager implement to further secure the
data? (Select TWO).
which of the following technologies is MOST effective f…
Usage of which of the following technologies is MOST effective for any removable storage device, such as hard drives and flash drives, in an organization to help
prevent data loss or theft?
Which of the following would BEST meet this goal?
An organization’s security policy requires that data be available in case of a natural disaster. Which of the following would BEST meet this goal?