Which of the following can the technician use to verify if a system file was compromised?
A technician wants to verify the authenticity of the system files of a potentially compromised
system. Which of the following can the technician use to verify if a system file was compromised?
(Select TWO).
Which of the following has been reported by the vulnerability scan?
Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent
penetration test reveals vulnerabilities on the network. Which of the following has been reported by
the vulnerability scan?
a music application posting the name of the current song playing on the device on a social media site)?
Which of the following is a control that allows a mobile application to access and manipulate
information which should only be available by another application on the same mobile device (e.g.
a music application posting the name of the current song playing on the device on a social media
site)?
Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organizati
During a disaster recovery planning session, a security administrator has been tasked with
determining which threats and vulnerabilities pose a risk to the organization. Which of the following
should the administrator rate as having the HIGHEST frequency of risk to the organization?
Which of the following would provide the BEST environment for performing this testing?
Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety
of servers before deployment to the production environment while utilizing a limited amount of
hardware resources. Which of the following would provide the BEST environment for performing
this testing?
Which of the following should be implemented to secure the devices without risking availability?
A company has proprietary mission critical devices connected to their network which are
configured remotely by both employees and approved customers. The administrator wants to
monitor device security without changing their baseline configuration. Which of the following
should be implemented to secure the devices without risking availability?
which of the following?
An administrator implements SELinux on a production web server. After implementing this, the
web server no longer serves up files from users’ home directories. To rectify this, the administrator
creates a new policy as the root user. This is an example of which of the following? (Select TWO).
Which of the following represents the greatest threat to maintaining data confidentiality with these devices?
A security administrator has deployed all laptops with Self Encrypting Drives (SED) and enforces
key encryption. Which of the following represents the greatest threat to maintaining data
confidentiality with these devices?
which of the following?
Establishing a method to erase or clear cluster tips is an example of securing which of the
following?
Which of the following documents outlines the technical and security requirements of an agreement between orga
Which of the following documents outlines the technical and security requirements of an
agreement between organizations?