Which of the following is the FIRST step of action recommended in this scenario?
Company XYZ has encountered an increased amount of buffer overflow attacks. The programmer
has been tasked to identify the issue and report any findings. Which of the following is the FIRST
step of action recommended in this scenario?
Which of the following is a penetration testing method?
Which of the following is a penetration testing method?
Which of the following would MOST likely involve GPS?
Which of the following would MOST likely involve GPS?
Which of the following should the administrator use to test the patching process quickly and often?
A company is about to release a very large patch to its customers. An administrator is required to
test patch installations several times prior to distributing them to customer PCs. Which of the
following should the administrator use to test the patching process quickly and often?
Which of the following should the administrator utilize to test for unidentified faults or memory leaks?
An application developer has tested some of the known exploits within a new application. Which of
the following should the administrator utilize to test for unidentified faults or memory leaks?
Which of the following policies should be enforced to prevent this from happening?
A recent review of accounts on various systems has found that after employees’ passwords are
required to change they are recycling the same password as before. Which of the following
policies should be enforced to prevent this from happening? (Select TWO).
Which of the following password enforcement policies would have mitigated this issue?
An organizations’ security policy requires that users change passwords every 30 days. After a
security audit, it was determined that users were recycling previously used passwords. Which of
the following password enforcement policies would have mitigated this issue?
Which of the following is this an example of?
The system administrator is reviewing the following logs from the company web server:
12:34:56 GET /directory_listing.php?user=admin&pass=admin1
12:34:57 GET /directory_listing.php?user=admin&pass=admin2
12:34:58 GET /directory_listing.php?user=admin&pass=1admin
12:34:59 GET /directory_listing.php?user=admin&pass=2admin
Which of the following is this an example of?
Which of the following should the security administrator implement?
A security administrator must implement a system that will support and enforce the following file
system access control model:
FILE NAME SECURITY LABEL
Employees.doc Confidential
Salary.xls Confidential
OfficePhones.xls Unclassified
PersonalPhones.xls Restricted
Which of the following should the security administrator implement?
Which of the following management controls should be introduced to the branch office to improve their state of
An overseas branch office within a company has many more technical and non-technical security
incidents than other parts of the company. Which of the following management controls should be
introduced to the branch office to improve their state of security?