Which of the following are reasons why a NIDS may be better to implement? (Select TWO)
A technician is deciding between implementing a HIDS on the database server or implementing a NIDS. Which of the following are reasons why a NIDS may be better to implement? (Select TWO).
If determining the risk, which of the following is the annual loss expectancy (ALE)?
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?
In this instance, which of the following is the BEST course of action?
After a system risk assessment was performed it was found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. In this instance, which of the following is the BEST course of action?
Which of the following type of attacks is similar to this product?
A CEO is concerned about staff browsing inappropriate material on the Internet via HTTPS. It has been suggested that the company purchase a product which could decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which of the following type of attacks is similar to this product?
The developer implemented which of the following security threats?
A developer added code to a financial system designed to transfer money to a foreign bank account on a specific time and date. The code would activate only if human resources processed the developers termination papers. The developer implemented which of the following security threats?
Which of the following security threats is MOST commonly associated with a targeted distributed denial of serv
Which of the following security threats is MOST commonly associated with a targeted distributed denial of service (DDoS)?
Which of the following is this an example of?
A programmer creates an application to accept data from a website. A user places more information than the program expects in the input field resulting in the back end database placing the extra information into the database. Which of the following is this an example of?
Which of the following is the MOST cost efficient method for accomplishing this?
A company needs to have multiple servers running low CPU utilization applications. Which of the following is the MOST cost efficient method for accomplishing this?
Which of the following BEST demonstrates the security basis for the password policy?
A user does not understand why the domain password policy is so stringent. Which of the following BEST demonstrates the security basis for the password policy?
Which of the following would BEST diagnose which NIC is causing this problem?
A technician suspects that one of the network cards on the internal LAN is causing a broadcast storm. Which of the following would BEST diagnose which NIC is causing this problem?