Which of the following settings must be configured?
A system administrator must configure the company’s authentication system to ensure that users will be unable
to reuse the last ten passwords within a six months period. Which of the following settings must be configured?
(Choose Two)
Which of the following commands can be used to see proc…
While responding to an incident on a new Windows server, the administrator needs to disable unused services.
Which of the following commands can be used to see processes that are listening on a TCP port?
Which of the following is a proprietary protocol common…
Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
Virtualization that allows an operating system kernel t…
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is called:
Which of the following job roles should receive trainin…
A security manager is preparing the training portion of an incident plan. Which of the following job roles should
receive training on forensics, chain of custody, and the order of volatility?
Which of the following attacks may be occurring?
After disabling SSID broadcast, a network administrator still sees the wireless network listed in available
networks on a client laptop. Which of the following attacks may be occurring?
Which of the following would have prevented the network…
A network was down for several hours due to a contractor entering the premises and plugging both ends of a
network cable into adjacent network jacks. Which of the following would have prevented the network outage?
(Choose Two)
This is an example of:
During a code review a software developer discovers a security risk that may result in hundreds of hours of
rework. The security team has classified these issues as low risk. Executive management has decided that the
code will not be rewritten. This is an example of:
Which of the following would BEST satisfy these require…
A developer needs to utilize AES encryption in an application but requires the speed of encryption and
decryption to be as fast as possible. The data that will be secured is not sensitive so speed is valued over
encryption complexity. Which of the following would BEST satisfy these requirements?
Which of the following actions should be performed?
An administrator needs to protect against downgrade attacks due to various vulnerabilities in SSL/TLS. Which
of the following actions should be performed? (Choose two.)