This is an example of a:
Matt, the security administrator, notices a large number of alerts on the NIDS. Upon further
inspection, it is determined that no attack has really taken place. This is an example of a:
Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees
Which of the following would Pete, a security administrator, MOST likely implement in order to
allow employees to have secure remote access to certain internal network services such as file
servers?
How could this BEST be accomplished?
Matt, the IT Manager, wants to create a new network available to virtual servers on the same
hypervisor, and does not want this network to be routable to the firewall. How could this BEST be
accomplished?
Which of the following ports should the security administrator allow on the firewall by default?
A security administrator has configured FTP in passive mode. Which of the following ports should
the security administrator allow on the firewall by default?
Which of the following could cause a browser to display the message below?
Which of the following could cause a browser to display the message below?
“The security certificate presented by this website was issued for a different website’s address.”
which of the following?
A company that purchased an HVAC system for the datacenter is MOST concerned with which of
the following?
Which of the following pseudocodes can be used to handle program exceptions?
Which of the following pseudocodes can be used to handle program exceptions?
Which of the following devices can Sara, an administrator, implement to detect and stop known attacks?
Which of the following devices can Sara, an administrator, implement to detect and stop known
attacks?
Which of the following protocols would be implemented to secure file transfers using SSL?
Which of the following protocols would be implemented to secure file transfers using SSL?
Which of the following security concepts are used for data classification and labeling to protect data?
Which of the following security concepts are used for data classification and labeling to protect
data? (Select TWO).