Which of the following concepts allows an organization to group large numbers of servers together in order to
Which of the following concepts allows an organization to group large numbers of servers together
in order to deliver a common service?
which are then used to perform boundary testing?
Which of the following security concepts identifies input variables which are then used to perform
boundary testing?
Which of the following is another name for this symmetric key?
Users need to exchange a shared secret to begin communicating securely. Which of the following
is another name for this symmetric key?
Which of the following cryptographic related browser settings allows an organization to communicate securely?
Which of the following cryptographic related browser settings allows an organization to
communicate securely?
Which of the following is the BEST reason to provide user awareness and training programs for organizational s
Which of the following is the BEST reason to provide user awareness and training programs for
organizational staff?
Which of the following correctly lists the protocols blocked and allowed?
A firewall technician has been instructed to disable all non-secure ports on a corporate firewall.
The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed
traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and
allowed?
Which of the following BEST describes the procedure and security rationale for performing such reviews?
A security administrator is responsible for performing periodic reviews of user permission settings
due to high turnover and internal transfers at a corporation. Which of the following BEST describes
the procedure and security rationale for performing such reviews?
The system administrator records the system time of all servers to ensure that:
A system administrator is responding to a legal order to turn over all logs from all company
servers. The system administrator records the system time of all servers to ensure that:
While rarely enforced, mandatory vacation policies are effective at uncovering:
While rarely enforced, mandatory vacation policies are effective at uncovering:
Which of the following types of testing does the company want performed?
A company hires outside security experts to evaluate the security status of the corporate network.
All of the company’s IT resources are outdated and prone to crashing. The company requests that
all testing be performed in a way which minimizes the risk of system failures. Which of the
following types of testing does the company want performed?