Which of the following ports would a security administrator block if the administrator wanted to stop users fr
Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Which of the following is a detective security control?
Which of the following is a detective security control?
Which of the following logical controls does a flood guard protect against?
Which of the following logical controls does a flood guard protect against?
The recovery agent is used to recover the:
The recovery agent is used to recover the:
Which of the following is the MOST likely cause?
A security engineer is troubleshooting a server in the DMZ, which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
Which of the following describes this form of access control?
A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Which of the following would BEST be used to identify the specific computer used by the insider?
Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of the following would BEST be used to identify the specific computer used by the insider?
Webmail is classified under which of the following cloud-based technologies?
Webmail is classified under which of the following cloud-based technologies?
Which of the following BEST describes the information security requirements of a virtualized server?
An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Which of the following is the MOST secure method of utilizing FTP?
Which of the following is the MOST secure method of utilizing FTP?