Which of the following should the administrator do to r…
A company utilizes a copier on the finance subnet. The security administrator is worried that the copier could have undisclosed vulnerabilities, as it has an
embedded operating system that can not be maintained. Which of the following should the administrator do to reduce the attack surface of the copier?
How can the network administrator BEST aggregate the lo…
A network administrator recently implemented two caching proxy servers on the network. How can the network administrator BEST aggregate the log files for the
proxy servers?
Which of the following parts of the incident response p…
A major breach occurred at an organization. The incident response team contained the breach and recovered from the incident. A number of things were wrong
during the incident response process and now the team must discuss and correct these items. Which of the following parts of the incident response process is the
team conducting?
Which of the following can be implemented to enable suc…
A company wants to ensure that all software executing on a corporate server has been authorized to do so by a central control point. Which of the following can be
implemented to enable such control.
Which of the following would provide the BEST encryptio…
A single server hosts a sensitive SQL-based database and a web service containing static content. A few of the database fields need to be encrypted due to
regulatory requirements. Which of the following would provide the BEST encryption solution for this particular server?
Which of the following should the security administrato…
A building engineer just installed a new environmental control system (ECS) for a room that is critical to the company’s operation and needs the ability to manage
and monitor the system from any part of the network. Which of the following should the security administrator utilize to minimize the attack surface and still allow the
needed access?
Which of the following is this an example of?
A company has implemented a public facing authentication system which uses PKI and extended attributes to allow third party web based application integration.
Which of the following is this an example of? (Select THREE)
Which of the following activities would be MOST likely …
Following a site survey for an upcoming 5GHz wireless network implementation, the project manager determines that several areas of the facility receive
inadequate coverage due to the use of vertical antennas on all access points. Which of the following activities would be MOST likely to remediate the issue without
changing the current access point layout in the facility?
Which of the following is MOST likely to have prevented…
A company’s security analyst is investigating the suspected compromise of the company’s intranet web server. The compromise occurred at a time when no users
were logged into the domain. Which of the following is MOST likely to have prevented the attack from a new machine introduced to the corporate network?
Which of the following is the primary reason why such a…
Upper management wishes to implement a policy forbidding the use of personal devices on the corporate network. Which of the following is the primary reason why
such a policy would be put in place?