Which of the following MOST likely occurred?
An employee has been terminated due to inappropriate Internet use. A computer forensics technician at the organization acquired an image of the hard drive and
hashed it using MD5. The former employee has filed a lawsuit. The former employee’s attorney requests a copy of the image so it can be independently reviewed
by the legal team. Upon receiving the image, the attorney’s technician also generates a MD5 hash of the image and comes up with a different output than what was
provided. Which of the following MOST likely occurred?
Which of the following explains why the administrator w…
A network administrator for a small business is configuring a wireless network for 20 users. Which of the following explains why the administrator would choose
WPA2 Personal over WPA Enterprise?
Which of the following mitigations would be MOST approp…
A server administrator is investigating a breach and determines that an attacker modified the application log to obfuscate the attack vector. During the lessons
learned activity the facilitator asks for a mitigation response to protect the integrity of the logs should a similar attack occur. Which of the following mitigations would
be MOST appropriate to fulfill the requirement?
Which of the following can be performed instead of comp…
A company has completed a continuity of operations plan and needs to validate that everyone knows what actions to perform. Which of the following can be
performed instead of completing a full fail over to validate the requirement?
which of the following best security practices and avoi…
Joe has been in the same IT position for the last 27 years and has developed a lot of homegrown applications that the company utilizes. The company is concerned
that Joe is the only one who can administer these applications. The company should enforce which of the following best security practices and avoid Joe being a
single point of failure?
Which of the following would BEST prevent unauthorized …
The Chief Security Officer (CSO) is concerned with unauthorized access at the company’s off-site datacenter. The CSO would like to enhance the security posture
of the datacenter. Which of the following would BEST prevent unauthorized individuals from gaining access to the datacenter?
Which of the following is MOST effective at cracking ha…
Which of the following is MOST effective at cracking hashed passwords?
Which of the following encryption solutions would meet …
An enterprise needs to be able to receive files that contain PII from many customers at different times. The data must remain encrypted during transport and while
at rest. Which of the following encryption solutions would meet both of these requirements?
Which of the following should the administrator impleme…
A company provides wireless access for employees and a guest wireless network for visitors. The employee wireless network is encrypted and requires a
password. The guest wireless network does not use an encrypted connection and does not require a password. An administrator walks by a visitor’s laptop and
notices the following command line output:
reaver – I mon – b 7a : E5 : 9A : 42 : 2C : C1 – vv
Starting…..
[+] Trying pin 12345678
[+] 93.41% complete @ 2015-01-10 10:30:21 (15 seconds)
[!] WARNING: 10 failed connections in a row
[+] Trying pin 12345688
…
Which of the following should the administrator implement and why?
Which of the following capabilities would be MOST suita…
A network has been impacted by downtime resulting from unauthorized devices connecting directly to the wired network. The network administrator has been
tasked to research and evaluate technical controls that would effectively mitigate risks associated with such devices. Which of the following capabilities would be
MOST suitable for implementation in this scenario?