Which of the following actions could have helped preven…
A website is breached, exposing the usernames and MD5 password hashes of its entire user base. Many of
these passwords are later cracked using rainbow tables. Which of the following actions could have helped
prevent the use of rainbow tables on the password hashes?
Which of the following device attributes was used to de…
A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the
corporate network. During a routine scan, the security administrator discovers an unauthorized device
belonging to a user in the marketing department. The user is using an android phone in order to browse
websites. Which of the following device attributes was used to determine that the device was unauthorized?
Which of the following protocols should be used to this?
Joe, the chief technical officer (CTO) is concerned that the servers and network devices may not be able to
handle the growing needs of the company. He has asked his network engineer to being monitoring the
performance of these devices and present statistics to management for capacity planning. Which of the
following protocols should be used to this?
what feature of virtualization?
A security analyst has a sample of malicious software and needs to know what the sample in a carefully
controlled and monitored virtual machine to observe the software’s behavior. After the software has run, the
analyst returns the virtual machines OS to a pre-defined know good state using what feature of virtualization?
Which of the following was implemented to detect this issue?
A one-time security audit revealed that employees do not have the appropriate access to system resources.
The auditor is concerned with the fact that most of the accounts audited have unneeded elevated permission to
sensitive resources. Which of the following was implemented to detect this issue?
Which of the following should be configured?
An administrator, Ann, wants to ensure that only authorized devices are connected to a switch. She decides to
control access based on MAC addresses. Which of the following should be configured?
Which of the following best describes this technique?
In order to gain an understanding of the latest attack tools being used in the wild, an administrator puts a Unix
server on the network with the root user’s password to set root. Which of the following best describes this
technique?
Which of the following controls can be implemented to p…
The internal audit group discovered that unauthorized users are making unapproved changes to various system
configuration settings. This issue occurs when previously authorized users transfer from one department to
another and maintain the same credentials. Which of the following controls can be implemented to prevent
such unauthorized changes in the future?
Which of the following practices would best allow for t…
A security engineer would like to analyze the effect of deploying a system without patching it to discover
potential vulnerabilities. Which of the following practices would best allow for this testing while keeping the
corporate network safe?
Which of the following could BEST prevent this from occ…
During a routine audit it is discovered that someone has been using a state administrator account to log into a
seldom used server. The person used server. The person has been using the server to view inappropriate
websites that are prohibited to end users. Which of the following could BEST prevent this from occurring again?