what mode?
In order for network monitoring to work properly, you need a PC and a network card running in what
mode?
Which of the following techniques enables a highly secured organization to assess security weaknesses in real
Which of the following techniques enables a highly secured organization to assess security weaknesses in
real time?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login process. Which
of the following BEST describes the email address?
Which of the following should be implemented to give the appropriate access while enforcing least privilege?
A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales.
Which of the following should be implemented to give the appropriate access while enforcing least
privilege?
which of the following?
An administrator implements SELinux on a production web server. After implementing this, the web
server no longer serves up files from users’ home directories. To rectify this, the administrator creates a
new policy as the root user. This is an example of which of the following? (Select TWO).
Which of the following represents the greatest threat to maintaining data confidentiality with these devices?
A security administrator has deployed all laptops with Self Encrypting Drives (SED) and enforces key
encryption. Which of the following represents the greatest threat to maintaining data confidentiality with
these devices?
Which of the following policies should be enforced to prevent this from happening?
A recent review of accounts on various systems has found that after employees’ passwords are required
to change they are recycling the same password as before. Which of the following policies should be
enforced to prevent this from happening? (Select TWO).
Which of the following password enforcement policies would have mitigated this issue?
An organizations’ security policy requires that users change passwords every 30 days. After a security
audit, it was determined that users were recycling previously used passwords. Which of the following
password enforcement policies would have mitigated this issue?
Which of the following should the security administrator implement?
A security administrator must implement a system that will support and enforce the following file system
access control model:
FILE NAME SECURITY LABEL
Employees.doc Confidential
Salary.xls Confidential
OfficePhones.xls Unclassified
PersonalPhones.xls Restricted
Which of the following should the security administrator implement?
Which of the following is the BEST reason for placing a password lock on a mobile device?
Which of the following is the BEST reason for placing a password lock on a mobile device?