which of the following types of security controls?
Visible security cameras are considered to be which of the following types of security controls?
Which of the following could BEST eliminate this issue?
It has been discovered that students are using kiosk tablets intended for registration and
scheduling to play games and utilize instant messaging. Which of the following could BEST
eliminate this issue?
which of the following is the MOST important security concern Ann should be aware of?
Ann is an employee in the accounting department and would like to work on files from her home
computer. She recently heard about a new personal cloud storage service with an easy web
interface. Before uploading her work related files into the cloud for access, which of the following is
the MOST important security concern Ann should be aware of?
Which of the following security controls BEST accomplishes this goal?
A security administrator would like to ensure that system administrators are not using the same
password for both their privileged and non-privileged accounts. Which of the following security
controls BEST accomplishes this goal?
Which of the following ports should be selected to establish a successful connection?
An active directory setting restricts querying to only secure connections. Which of the following
ports should be selected to establish a successful connection?
Which of the following did the developer MOST likely implement?
A new client application developer wants to ensure that the encrypted passwords that are stored in
their database are secure from cracking attempts. To implement this, the developer implements a
function on the client application that hashes passwords thousands of times prior to being sent to
the database. Which of the following did the developer MOST likely implement?
Which of the following could Ann implement to help identify accounts that are still active for terminated empl
Ann, a security analyst, has discovered that her company has very high staff turnover and often
user accounts are not disabled after an employee leaves the company. Which of the following
could Ann implement to help identify accounts that are still active for terminated employees?
Which of the following will Joe need to use to BEST accomplish the objective?
Joe must send Ann a message and provide Ann with assurance that he was the actual sender.
Which of the following will Joe need to use to BEST accomplish the objective?
which of the following ports?
Signed digital certificates used to secure communication with a web server are MOST commonly
associated with which of the following ports?
Which of the following attacks involves the use of previously captured network traffic?
Which of the following attacks involves the use of previously captured network traffic?