Which of the following would be the MOST efficient meth…
A systems administrator is working with a third party to establish the automated transfer of large amounts of proprietary data. The interface will need to use secured
credentials and the transmission will consist of data that has been encrypted prior to transit and needs no additional protection. Which of the following would be the
MOST efficient method of data transmission given the established requirements?
Which of the following would be the BEST control to imp…
A company wants to be made aware of anyone who enters onto their property. Which of the following would be the BEST control to implement?
Which of the following can the employee perform if the …
A company has hired a an ex-employee to perform a penetration test of the company’s proprietary application. Although the ex-employee used to be part of the
development team, the application has gone through some changes since the employee left. Which of the following can the employee perform if the company is not
willing to release any information to the ex-employee?
Which of the following can be used to standardize and e…
During a recent vulnerability assessment the penetration testers were able to successfully crack a large number of employee passwords. The company technology
use agreement clearly states that passwords used on the company network must be at least eight characters long and contain at least one uppercase letter and
special character. Which of the following can be used to standardize and enforce the password complexity rules across the entire organization to resolve the issue?
Which of the following actions is appropriate for the website administrator to…
A high traffic website is experiencing numerous brute force attacks against its user base. The attackers are using a very large botnet to carry out the attack. As a
result, many users passwords are being compromised Which of the following actions is appropriate for the website administrator to take in order to reduce the
threat from this type of attack in the future. .
The auditor performs a test on the network, resulting i…
A security auditor has full knowledge of company configuration and equipment. The auditor performs a test on the network, resulting in an exploitation of a zero-day
vulnerability.
Which of the following are valid token password schemes…
A security administrator is responsible for deployment of a new two factor authentication solution. The administrator has been informed that the solution will use soft
tokens. Which of the following are valid token password schemes for the two factor solution being deployed? (Select TWO)
Which of the following commands can be used to see proc…
When responding to an incident on a new Windows server, the administrator needs to disable unused services. Which of the following commands can be used to
see processes that are listening on a TCP port?
Which of the following is MOST likely configured improperly?
The border firewall rules were recently modified by a network administrator to allow access to a new service on Server 1 using the default https port. When testing
the new rules internal to the company network there are no issues and when testing from an external connection it does not work. The host running the service
does not receive external packets. Other services hosted on Server 1 are responding fine to to both internal and external connection attempts. Which of the
following is MOST likely configured improperly?
Which of the following methods can the analyst use to s…
A security analyst at a nuclear power plant needs to secure network traffic from the legacy SCADA systems. Which of the following methods can the analyst use to
secure network in this static environment?