Which of the following will execute malicious code at a pre-specified...
Which of the following exploits is only triggered by specific date or...
A number of unauthorized staff have been entering the data center by...
Which of the following would a password cracker help an administrator...
Which of the following usually applies specifically to a web browser?
A user wants to implement very tight security controls for technicians...
A manufacturing corporation has decided to send a highly sensitive...
Which of the following physical threats is prevented with mantraps?
Which of the following BEST applies in the secure disposal of...
The service provided by message authentication code (MAC) hash is:
A user is going to dispose of some old hard drives. Which of the...
Which of the following is a mechanism that prevents electromagnetic...
Which of the following is a cryptographic representation of...
Which of the following concepts, requires users and system processes...
Which of the following reduces the effectiveness of telephone social...
Which of the following allows for a secure connection to be made...
Which of the following is the quickest method to create a secure test...
After a system risk assessment was performed it was found that the...
Which of the following practices should be implemented to harden...
An administrator notices that a PC is sending an unusual amount of...
When is the best time to discuss the appropriate use of electronic...
Which of the following is the MOST intrusive on a network?
Which of the following is a risk associated with a virtual server?
Which of the following is a security benefit of mandatory vacations?
Which of the following is a collection of fixes for an application or...
An antivirus server keeps flagging an approved application that the...
An administrator is running a network monitoring application that...
Which of the following describes the process of comparing...
An administrator is assigned to monitor servers in a data...
Which of the following describes the difference between a secure...
Which of the following BEST describes risk analysis?
An administrator notices on the monthly firewall log that many of the...
An administrator is backing up all server data nightly to a NAS...
Three generally accepted activities of patch management are: ...
If an administrator does not have a NIDS examining network traffic,...
Which of the following ia a problem MOST often associated with UTP...
A user logs into their network with a smart card. Which of the...
An administrator wants to ensure that when an employee leaves the...
When using discretionary access control (DAC), who determines access...
Which of the following reduces the attack surface of an operating...
All of the following are where backup tapes should be kept EXCEPT:
Which of the following could BEST assist in the recovery of a crashed...
All of the following require periodic updates to stay accurate EXCEPT:
A technician is working on an end users desktop which has been having...
The use of a physical token, PIN and a password during authentication...
Which of the following encryption methods is often used along with...
Which of the following would BEST allow an administrator to quickly...
Some examples of hardening techniques include all of the following...
In which of the following situations would it be appropriate to...
A CEO is concerned about staff browsing inappropriate material on the...
Which of the following is a security threat that hides its processes...
Which of the following authentication mechanisms performs better in a...
Which of the following organizational documentation provides high...
Which of the following scenarios is MOST likely to benefit from using...
Which of the following BEST describes the differences between RADIUS...
Configuration baseline should be taken at which of the following...
Which of the following would BEST allow for fast, highly secure...
An organization has recently implemented a work from home...
Which of the following methods will help to identify when unauthorized...
Security templates are used for which of the following purposes?...
Which of the following hashing techniques is commonly disabled to make...
Ensuring administrators have both a regular user account and a...
When a server and workstation communicate via SSL, which if the...
All of the following are steps in the incident response process...
Which of the following is an example to two-factor authentication for...
Social engineering, password cracking and vulnerability exploitation...
To evaluate the security compliance of a group of servers against best...
Which of the following is the BEST order in which crucial equipment...
An administrator wants to block users from accessing a few...
Which of the following are MOST likely to be analyzed by Internet...
Frequent signature updates are required by which of the following...
Which of the following BEST describes the differences between RADIUS...
Which of the following organizational documentation describes how...
A small call center business decided to install an email system to...
Which of the following describes software that is often written solely...
A CRL contains a list of which of the following type of keys?
The primary function of risk management is an organization is to...
A technician is performing an assessment on a router and discovers...
Virtualized applications, such as virtualized browsers, are capable of...
When choosing an antivirus product, which of the following are the...
Which of the following BEST describes the differences between SHA-1...
Which of the following would require a pre-sharing of information...
Pre-shared keys apply to which of the following?
A company has an issue with field users logging into VPN to connect to...
The data custodian in an organization is responsible for:
A flat or simple role-based access control (RBAC) embodies which of...
Which of the following facilitates the creation of an unencrypted...
A single sign-on requires which of the following?
Threats to a network could include: (Select TWO)
Port 3535 is typically blocked for outbound traffic on a companys...
Which of the following would BEST allow an administrator to quickly...
A security manager believes that too many services are running on a...
Which of the following is setup within a router?
All of the following are weaknesses of WEP EXCEPT:
A vendor releases an application update to a recent service pack that...
Which of the following is LEAST likely to help reduce single points of...
A technician is deciding between implementing a HIDS on the database...
Which of the following sites can be online the QUICKEST and does not...
Which of the following describes a spanned switch port in the context...
A financial institution performed a risk assessment on the DLT backup...