Which of the following might an attacker resort to in order to recover...
Which of the following attacks can be caused by a user being unaware...
Which of the following is commonly used in a distributed denial of...
Which of the following type of strategies can be applied to allow a...
Which of the following is an attack that is triggered by a specific...
Which of the following is a true statement with regards to a NIDS?
After registering an email address on a website, a user starts...
Which of the following is the primary purpose of a honeypot?
While conducting a review of the system logs, a user had attempted to...
The RAS logs on a server show 100 errors in a two minute time period...
Which of the following is a publication of inactivated user...
Password crackers are generally used by malicious attackers to:
Which of the following is a collection of patches?
End users are complaining about receiving a lot of email from online...
Which of the following access control methods grants permissions based...
Which of the following is a method of encrypting email?
If a user attempts to go to a website and notices the URL has changed,...
Which of the following methods is used to perform denial of service...
A technician is reviewing the logical access control method an...
A technician suspects that a piece of malware is consuming too many...
A user has decided that they do not want an internal LAN segment to...
An administrator wants to ensure that that no equipment is damaged...
Which of the following is a best practice to prevent users from being...
How should a company test the integrity of its backup data?
Which of the following logical access controls would be MOST...
Which of the following is the MOST secure alternative for...
An administrator is implementing a public website and they want all...
Which of the following is the main objective of steganography?
Which of the following access control methods includes switching work...
Which of the following threats is the MOST difficult to detect and...
When is the BEST time to update anti-virus definitions?
A technician is testing the security of a new database application...
Which of the following type of fire suppression tools would cause the...
Which of the following allows devices attached to the same switch to...
Which of the following allows for proof that a certain person sent a...
Which of the following risks would be reduced by implementing screen...
A malware incident has just been detected within a company. Which of...
A user is redirected to a different website when the user requests the...
Which of the following is a CRL composed of?
An administrator wants to replace telnet with a more secure protocol...
Which of the following is a software bundle containing multiple...
Which of the following is the BEST place where the disaster recovery...
How many keys are utilized with asymmetric cryptography?
Which of the following is a single server that is setup in the DMZ or...
Which of the following ensures a user cannot deny having sent a...
An administrator has developed an OS install that will implement the...
Which of the following is an installable package that includes several...
Which of the following provides the MOST comprehensive redundancy for...
Which of the following allows a technician to scan for missing patches...
An administrator has implemented a new SMTP service on a server. A...
A programmer has decided to alter the server variable in the coding of...
Which of the following describes the process of securely removing...
Which of the following specifies a set of consistent requirements for...
Users do not want to enter credentials to each server or application...
Which of the following allows for notification when a hacking attempt...
Which of the following is a reason why a company should disable the...
During a risk assessment it is discovered that only one system...
An administrator is trying to secure a network from threats...
Which of the following should be implemented to have all workstations...
An administrator wants to setup their network with only one public IP...
Why would a technician use a password cracker?
Which of the following is the primary purpose of a CA?
How should a company test the integrity of its backup data?
Which of the following will propagate itself without any user...
Which of the following principles should be applied when assigning...
Which of the following is a security threat when a new network device...
Which of the following allows for the highest level of security at...
Which of the following allows an attacker to manipulate files by using...
Which of the following would be BEST to use to apply corporate...
Which of the following practices is MOST relevant to protecting...
Which of the following would be MOST useful to determine why packets...
After issuance a technician becomes aware that some keys were issued...
Which of the following is the BEST tool for allowing users to go to...
Accessing a system or application using permissions from another users...
Which of the following network tools would provide the information on...
An administrator suspects that files are being copied to a remote...
Which of the following access control methods gives the owner control...
Which of the following allows an attacker to hide the presence of...
Which of the following should a technician review when a user is moved...
A company's website allows customers to search for a product and...
A company wants to host public servers on a new network. These servers...
Which of the following can reduce the risk associated with password...
Antivirus software products detect malware by comparing the...
When deploying 50 new workstations on the network, which of following...
Which of the following technologies can be used as a means to isolate...
An unauthorized user intercepted a users password and used this...
An administrator notices that former temporary employees accounts are...
When dealing with a 10BASE5 network, which of the following is the...
Which of following can BEST be used to determine the topology of a...
When should a technician perform penetration testing?
Which of the following improves security in a wireless system?
Which of the following allows a technician to correct a specific issue...
Which of the following can be used as a means for dual-factor...
Sending a patch through a testing and approval process is an example...
Which of the following would an attacker use to footprint a system?
A technician wants to regulate and deny traffic to websites that...
Which of the following BEST describes the term war driving?
Which of the following tools would be used to review network traffic...
Sending continuous TCP requests to a device and ignoring the return...
An administrator wants to proactively collect information on attackers...
If a certificate has been compromised, which of the following should...
Which of the following is the BEST way to reduce the number of...
A technician is implementing a new wireless network for an...
Which of the following creates a security buffer zone between two...
Which of the following is a list of discrete entries that are known to...
Which of the following allows an attacker to embed a rootkit into a...
Which of the following is a way to logically separate a network...
Which of the following is a reason to implement security logging on a...
Which of the following is considered the weakest encryption?
Which of the following statements BEST describes the implicit deny...
All of the following provide confidentiality protection as part of the...
Which of the following BEST describes a private key in regards to...
Which of the following is the LEAST intrusive way of checking the...
During the implementation of LDAP, which of the following will...
How would a technician implement a security patch in an enterprise...
Users on a network report that they are receiving unsolicited emails...
Which of the following is a common practice in forensic investigation?
Which of the following type of attacks would allow an attacker to...
Which of the following may be an indication of a possible system...
Users are utilizing thumb drives to connect to USB ports on company...
Which of the following is done to ensure appropriate personnel have...
A user was trying to update an open file but when they tried to access...
Which of the following is a best practice for coding applications in a...
Which of the following is established immediately upon evidence...
On which of the following is a security technician MOST likely to find...
After implementing file auditing, which of the following logs would...
Which of the following type of attacks requires an attacker to sniff...
Which of the following actions should be performed upon discovering an...
An administrator in a small office environment has implemented an IDS...
A company uses a policy of assigning passwords to users, by default...
Which of the following authentication methods would MOST likely...
Which of the following algorithms is the LEAST secure?
Which of the following properly describes penetration testing?
A technician is rebuilding the infrastructure for an organization. The...
Which of the following tools will allow the technician to find all...
Which of the following encryption schemes is the public key...
An administrator has been studying stateful packet inspection and...
Which of the following is an important reason for password protecting...
Which of the following network filtering devices will rely on...
Which of the following is an exploit against a device where only the...
Which of the following is the BEST process of removing PII data from a...
Which of the following algorithms is MOST closely associated with the...
User A is a member of the payroll security group. Each member of the...
Which of the following is a security trait of a virtual machine?
A user is attempting to receive digitally signed and encrypted email...
Which of the following is MOST likely provided by asymmetric key...
Which of the following is an example of security personnel that...
A smurf attack is an example of which of the following threats?
Which of the following is the MOST recent addition to cryptography?
A small call center business decided to install an email system to...
An administrator has been asked to encrypt credit card data. Which of...
Which of the following would allow an administrator to find weak...
Which of the following is a required privilege that an administrator...
Which of the following redundancy solutions contains hardware systems...
A technician needs to detect staff members that are connecting to an...
Taking into account personal safety, which of the following types of...
Which of the following is a way to encrypt session keys using SSL?
Which of the following would be the MOST secure choice to implement...
Which of the following algorithms have the smallest key space?
Which of the following BEST describes ARP?
An executive uses PKI to encrypt sensitive emails sent to an...
Which of the following is MOST efficient for encrypting large amounts...
An organization is installing new servers into their infrastructure. A...
Which of the following is the primary security risk with coaxial...
Which of the following uses a key ring?
Which of the following requires an update to the baseline after...
Which of the following virtual machine components monitors and manages...
Kerberos uses which of the following trusted entities to issue...
When assigning permissions, which of the following concepts should be...
Which of the following is a way to manage operating system updates?
Which of the following can an attacker use to gather information on a...
All of the following are symmetric key algorithms EXCEPT:
A user wants to implement secure LDAP on the network. Which of the...
An administrator suspects that multiple PCs are infected with a...
Which of the following logs might reveal the IP address and MAC...
Which of the following would allow for secure key exchange over an...
An administrator does not want anyone to VPN from inside the network...
Which of the following increases the collision resistance of a hash?
Which of the following requires a common pre-shared key before...
Which of the following security policies is BEST to use when trying to...
Which of the following are characteristics of a hash function? (Select...
Which of the following encryption algorithms is decrypted in the LEAST...
Which of the following is true about ECC algorithms?
Assigning proper security permissions to files and folders is the...