Which of the following is the MOST likely type of attack?
A security engineer notices that unknown devices are connecting to the company’s wireless network and trying to access the database server. The wireless access
point is configured with WPA for encryption and the network administrator setup an digit pin for easy setup to the wireless access point. Which of the following is the
MOST likely type of attack?
Which of the following should be undertaken to prevent …
A company experienced an intrusion into their network due to a perimeter firewall being compromised. A review of the firewall logs indicate that the service was
accessed using the administrative account. Which of the following should be undertaken to prevent future intrusions? (Select TWO).
Which of the following is most likely occurring?
Which of the following can the administrator do to fix …
A system administrator is troubleshooting an issue affecting some FTP connections. Some employees are unable to upload or download files, although the firewall
is allowing the default FTP port. Which of the following can the administrator do to fix this case?
Which of the following is required to implement the arc…
A PKI architect is implementing a corporate enterprise solution. The solution must incorporate key escrow and recovery agents, as well as a tiered architecture.
Which of the following is required to implement the architecture correctly?
Which of the following would the security administrator…
A security administrator has been asked to assist with the identification of a BYOD design that will ensure corporate data can be managed and monitored separately
from personal data. Which of the following would the security administrator recommend?
Which of the following should the engineer send to the …
A security engineer wants to communicate securely with a third party using PGP. Which of the following should the engineer send to the third party to enable the
third party to securely encrypt email replies?
Which of the following tasks should the security admini…
A security administrator is reviewing the event logs of the company server. There are numerous entries for attempts to log into the telnet service with an account
named “root.” After further review of the access to the server the security administrator determines that there is a business need for another server in the company
via telnet to the server under review. Which of the following tasks should the security administrator perform to improve the security posture of the server? (Select
TWO).
Which of the following would eliminate Ann’s excuse in …
Several customers received an email from an employee that advertised better rates at a different company. Shortly after the email was sent, Ann, the employee
who sent the email, resigned and joined the other company. When confronted, Ann claimed that she did not send the email, it was another person spoofing her
email address. Which of the following would eliminate Ann’s excuse in the future?
Which of the following BEST identifies the stage of inc…
A company was recently the victim of a major attack which resulted in significant reputational loss. Joe a member of the company incident response team is
currently reviewing Standard Operating Procedures for the team in the wake of the attack. Which of the following BEST identifies the stage of incident response that
Joe is in?