Which of the following has the potential to cause the MOST amount of damage if the account was compromised?
An administrator was asked to review user accounts. Which of the following has the potential to
cause the MOST amount of damage if the account was compromised?
which of the following application attacks?
Failure to validate the size of a variable before writing it to memory could result in which of the
following application attacks?
which of the following security best practices?
A Human Resources user is issued a virtual desktop typically assigned to Accounting employees.
A system administrator wants to disable certain services and remove the local accounting groups
installed by default on this virtual machine. The system administrator is adhering to which of the
following security best practices?
Which of the following controls would BEST address this security concern?
A business has set up a Customer Service kiosk within a shopping mall. The location will be
staffed by an employee using a laptop during the mall business hours, but there are still concerns
regarding the physical safety of the equipment while it is not in use. Which of the following controls
would BEST address this security concern?
Which of the following BEST addresses these requirements if the environment is concurrently shared by multip
A security administrator wants to implement a solution which will allow some applications to run
under the user’s home directory and only have access to files stored within the same user’s folder,
while other applications have access to shared folders. Which of the following BEST addresses
these requirements if the environment is concurrently shared by multiple users?
Which of the following solutions would mitigate this issue?
After a company has standardized to a single operating system, not all servers are immune to a
well-known OS vulnerability. Which of the following solutions would mitigate this issue?
Which of the following technologies would BEST be suited to accomplish this?
A security technician would like to obscure sensitive data within a file so that it can be transferred
without causing suspicion. Which of the following technologies would BEST be suited to
accomplish this?
Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on e
Which of the following should a company implement to BEST mitigate from zero-day malicious
code executing on employees’ computers?
Which of the following technologies provides the FASTEST revocation capability?
A company is concerned that a compromised certificate may result in a man-in-the-middle attack
against backend financial servers. In order to minimize the amount of time a compromised
certificate would be accepted by other servers, the company decides to add another validation
step to SSL/TLS connections. Which of the following technologies provides the FASTEST
revocation capability?
which of the following?
Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program
that encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same
program to create a hidden volume within the encrypted hard drive and stores the sensitive
information within the hidden volume. This is an example of which of the following? (Select TWO).