<< Prev Question Next Question >>

Question 14/900

After viewing wireless traffic, an attacker notices the following networks are being broadcasted by local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information, the attacker spoofs a response to make nearby laptops connect back to a malicious device. Which of the following has the attacker created?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (900q)
Question 1: Which of the following is an attack designed to activate bas...
Question 2: Which of the following allows a company to maintain access t...
Question 3: A security administrator is tasked with calculating the tota...
Question 4: A company has a corporate infrastructure where end users man...
Question 5: An administrator discovers that many users have used their s...
Question 6: Ann, a security administrator at a call center, has been exp...
Question 7: Jane, an individual, has recently been calling various finan...
Question 8: An administrator must select an algorithm to encrypt data at...
Question 9: A security technician has been tasked with opening ports on ...
Question 10: Symmetric encryption utilizes __________, while asymmetric e...
Question 11: Ann, a security analyst, is preparing for an upcoming securi...
Question 12: Which of the following is commonly LDAP and Kerberos used fo...
Question 13: An attacker used an undocumented and unknown application exp...
Question 14: After viewing wireless traffic, an attacker notices the foll...
Question 15: An application developer has coded a new application with a ...
Question 16: A company's security administrator wants to manage PKI for i...
Question 17: Input validation is an important security defense because it...
Question 18: An organization is required to log all user internet activit...
Question 19: A network stream needs to be encrypted. Sara, the network ad...
Question 20: When information is shared between two separate organization...
Question 21: Which of the following documents outlines the technical and ...
Question 22: The security administrator generates a key pair and sends on...
Question 23: A security administrator is selecting an MDM solution for an...
Question 24: An organization is implementing a password management applic...
Question 25: Sara, a security engineer, is testing encryption ciphers for...
Question 26: A security manager is discussing change in the security post...
Question 27: The security administrator is observing unusual network beha...
Question 28: A network technician is configuring clients for VLAN access....
Question 29: A company plans to expand by hiring new engineers who work i...
Question 30: Which of the following is an attack designed to activate bas...
Question 31: An attacker crafts a message that appears to be from a trust...
Question 32: Sara, a security manager, has decided to force expiration of...
Question 33: Given the following list of corporate access points, which o...
Question 34: A company has had several security incidents in the past six...
Question 35: Failure to validate the size of a variable before writing it...
Question 36: A financial company requires a new private network link with...
Question 37: The security administrator runs an rpm verify command which ...
Question 38: A security technician wants to implement stringent security ...
Question 39: Which of the following BEST describes part of the PKI proces...
Question 40: A security administrator must implement a system that will s...
Question 41: Ann an employee is visiting Joe, an employee in the Human Re...
Question 42: Which of the following protocols is MOST likely to be levera...
Question 43: Mike, a user, states that he is receiving several unwanted e...
Question 44: A software firm posts patches and updates to a publicly acce...
Question 45: After Ann, a user, logs into her banking websites she has ac...
Question 46: Given the following set of firewall rules: From the inside t...
Question 47: A company recently experienced several security breaches tha...
Question 48: Joe the system administrator has noticed an increase in netw...
Question 49: The Chief Security Officer (CSO) is contacted by a first res...
Question 50: A company recently experienced data loss when a server crash...
Question 51: A router was shut down as a result of a DoS attack. Upon rev...
Question 52: In order to securely communicate using PGP, the sender of an...
Question 53: Internet banking customers currently use an account number a...
Question 54: An auditor's report discovered several accounts with no acti...
Question 55: Which of the following would MOST likely involve GPS?...
Question 56: A quality assurance analyst is reviewing a new software prod...
Question 57: Which of the following BEST describes the type of attack tha...
Question 58: Joe, a user, wants to protect sensitive information stored o...
Question 59: A system administrator is notified by a staff member that th...
Question 60: Ann a network administrator has been tasked with strengtheni...
Question 61: Jane, a security analyst, is reviewing logs from hosts acros...
Question 62: An administrator is implementing a new management system for...
Question 63: Which of the following MUST Matt, a security administrator, ...
Question 64: Which of the following practices is used to mitigate a known...
Question 65: A website is breached, exposing the usernames and MD5 passwo...
Question 66: A new mobile banking application is being developed and uses...
Question 67: A security administrator wants to block unauthorized access ...
Question 68: A user has plugged in a wireless router from home with defau...
Question 69: A chief information security officer (CISO) is providing a p...
Question 70: A network manager needs a cost-effective solution to allow f...
Question 71: Which of the following describes how Sara, an attacker, can ...
Question 72: Which of the following is a common coding error in which bou...
Question 73: A recent audit has revealed that several users have retained...
Question 74: Which of the following is the BEST way to prevent Cross-Site...
Question 75: A group of users from multiple departments are working toget...
Question 76: A security administrator has been tasked with setting up a n...
Question 77: Which of the following security benefits would be gained by ...
Question 78: An administrator is implementing a security control that onl...
Question 79: A group policy requires users in an organization to use stro...
Question 80: A systems engineer has been presented with storage performan...
Question 81: In the course of troubleshooting wireless issues from users,...
Question 82: Which of the following software allows a network administrat...
Question 83: A security analyst performs the following activities: monito...
Question 84: A security administrator finds that an intermediate CA withi...
Question 85: A company has experienced problems with their ISP, which has...
Question 86: Which of the following tools would allow Ann, the security a...
Question 87: Which of the following is a notification that an unusual con...
Question 88: Joe, a security analyst, is attempting to determine if a new...
Question 89: The security manager must store a copy of a sensitive docume...
Question 90: A security technician is attempting to improve the overall s...
Question 91: An employee finds a USB drive in the employee lunch room and...
Question 92: During an office move a sever containing the employee inform...
Question 93: Several departments in a corporation have a critical need fo...
Question 94: Certificates are used for: (Choose two.)...
Question 95: A security analyst has a sample of malicious software and ne...
Question 96: A trojan was recently discovered on a server. There are now ...
Question 97: Timestamps and sequence numbers act as countermeasures again...
Question 98: Which of the following protocols is used to validate whether...
Question 99: Pete, a developer, writes an application. Jane, the security...
Question 100: A security administrator is reviewing logs and notices multi...
Question 101: After a recent breach, the security administrator performs a...
Question 102: Which of the following can be utilized in order to provide t...
Question 103: A system administrator has noticed that users change their p...
Question 104: Which of the following types of security controls are visibl...
Question 105: Which of the following functions provides an output which ca...
Question 106: Which of the following authenticate connections using point-...
Question 107: A system administrator wants to prevent password compromises...
Question 108: Pete's corporation has outsourced help desk services to a la...
Question 109: Which of the following is true about the CRL?...
Question 110: How must user accounts for exiting employees be handled?...
Question 111: Four weeks ago a network administrator applied a new IDS and...
Question 112: Which of the following concepts is BEST described as develop...
Question 113: Which of the following protocols uses an asymmetric key to o...
Question 114: Which of the following helps to establish an accurate timeli...
Question 115: Which of the following is the BEST practice when dealing wit...
Question 116: Several bins are located throughout a building for secure di...
Question 117: A security administrator wants to perform routine tests on t...
Question 118: Which of the following types of application attacks would be...
Question 119: A new virtual server was created for the marketing departmen...
Question 120: A malicious individual is attempting to write too much data ...
Question 121: Which of the following assessments would Pete, the security ...
Question 122: Which of the following technical controls helps to prevent S...
Question 123: A security administrator develops a web page and limits inpu...
Question 124: An attacker Joe configures his service identifier to be the ...
Question 125: Recent data loss on financial servers due to security breach...
Question 126: Users report that they are unable to access network printing...
Question 127: To mitigate the risk of intrusion, an IT Manager is concerne...
Question 128: Which of the following attacks involves the use of previousl...
Question 129: Which of the following is a requirement when implementing PK...
Question 130: Ann is a member of the Sales group. She needs to collaborate...
Question 131: A set of standardized system images with a pre-defined set o...
Question 132: Which of the following can hide confidential or malicious da...
Question 133: Which of the following is a best practice when setting up a ...
Question 134: A company's password and authentication policies prohibit th...
Question 135: When an order was submitted via the corporate website, an ad...
Question 136: A security analyst, while doing a security scan using packet...
Question 137: Which of the following is replayed during wireless authentic...
Question 138: Jane, a VPN administrator, was asked to implement an encrypt...
Question 139: Methods to test the responses of software and web applicatio...
Question 140: A business has set up a Customer Service kiosk within a shop...
Question 141: A security administrator must implement a wireless encryptio...
Question 142: Matt, a security consultant, has been tasked with increasing...
Question 143: While working on a new project a security administrator want...
Question 144: Which of the following tests a number of security controls i...
Question 145: Jane has implemented an array of four servers to accomplish ...
Question 146: After an audit, it was discovered that an account was not di...
Question 147: Which of the following internal security controls is aimed a...
Question 148: An employee connects a wireless access point to the only jac...
Question 149: Which of the following BEST explains Platform as a Service?...
Question 150: The security department has implemented a new laptop encrypt...
Question 151: After a company has standardized to a single operating syste...
Question 152: A distributed denial of service attack can BEST be described...
Question 153: Which of the following attacks initiates a connection by sen...
Question 154: A customer has provided an email address and password to a w...
Question 155: Which statement is TRUE about the operation of a packet snif...
Question 156: A security analyst is working on a project team responsible ...
Question 157: Which of the following describes a type of malware which is ...
Question 158: Which of the following malware types may require user intera...
Question 159: After a recent internal audit, the security administrator wa...
Question 160: Which of the following is being tested when a company's payr...
Question 161: Mike, a security professional, is tasked with actively verif...
Question 162: A user has several random browser windows opening on their c...
Question 163: A recent audit has revealed weaknesses in the process of dep...
Question 164: Which of the following is the term for a fix for a known sof...
Question 165: Which of the following would a security administrator implem...
Question 166: A security administrator is responsible for ensuring that th...
Question 167: In PKI, a key pair consists of: (Choose two.)...
Question 168: A company has had their web application become unavailable s...
Question 169: The Chief Information Security Officer (CISO) is concerned t...
Question 170: Which of the following can be used on a smartphone to BEST p...
Question 171: A security administrator examines a network session to a com...
Question 172: Ann, a security administrator is hardening the user password...
Question 173: Which device monitors network traffic in a passive manner?...
Question 174: Which of the following attacks targets high level executives...
Question 175: The process of making certain that an entity (operating syst...
Question 176: The chief information officer (CIO) of a major company inten...
Question 177: A company's employees were victims of a spear phishing campa...
Question 178: Joe, a security technician, is configuring two new firewalls...
Question 179: In the case of a major outage or business interruption, the ...
Question 180: Pete, an employee, needs a certificate to encrypt data. Whic...
Question 181: Matt, a security analyst, needs to select an asymmetric encr...
Question 182: Prior to leaving for an extended vacation, Joe uses his mobi...
Question 183: An administrator is assigned to monitor servers in a data ce...
Question 184: While responding to an incident on a Linux server, the admin...
Question 185: A company hires outside security experts to evaluate the sec...
Question 186: A user casually browsing the Internet is redirected to a war...
Question 187: Which of the following would Matt, a security administrator,...
Question 188: An assessment too reports that the company's web server may ...
Question 189: Which of the following should be done before resetting a use...
Question 190: A security specialist has been asked to evaluate a corporate...
Question 191: After working on his doctoral dissertation for two years, Jo...
Question 192: Company A sends a PGP encrypted file to company B. If compan...
Question 193: Users have reported receiving unsolicited emails in their in...
Question 194: A security manager must remain aware of the security posture...
Question 195: Which of the following ports should be opened on a firewall ...
Question 196: Which of the following tools would a security administrator ...
Question 197: Which of the following is synonymous with a server's certifi...
Question 198: Which of the following devices is used for the transparent s...
Question 199: Searching for systems infected with malware is considered to...
Question 200: Privilege creep among long-term employees can be mitigated b...
Question 201: A technician installed two ground plane antennae on 802.11n ...
Question 202: An incident occurred when an outside attacker was able to ga...
Question 203: Ann, an employee, is cleaning out her desk and disposes of p...
Question 204: Devices on the SCADA network communicate exclusively at Laye...
Question 205: A technician wants to verify the authenticity of the system ...
Question 206: A user has forgotten their account password. Which of the fo...
Question 207: A network administrator is responsible for securing applicat...
Question 208: Which of the following technologies uses multiple devices to...
Question 209: Ann, the system administrator, is installing an extremely cr...
Question 210: Some customers have reported receiving an untrusted certific...
Question 211: An employee from the fire Marshall's office arrives to inspe...
Question 212: Which of the following allows an organization to store a sen...
Question 213: Which of the following is primarily used to provide fault to...
Question 214: The Chief Executive Officer (CEO) receives a suspicious voic...
Question 215: A security administrator is tackling issues related to authe...
Question 216: A programmer must write a piece of code to encrypt passwords...
Question 217: Which of the following documents outlines the responsibility...
Question 218: An advantage of virtualizing servers, databases, and office ...
Question 219: A recent audit has discovered that at the time of password e...
Question 220: A company wants to ensure that its hot site is prepared and ...
Question 221: A network administrator has recently updated their network d...
Question 222: One month after a software developer was terminated, the hel...
Question 223: A system administrator is configuring a new file server and ...
Question 224: Pete, the system administrator, is reviewing his disaster re...
Question 225: An internal auditing team would like to strengthen the passw...
Question 226: Which of the following is true about input validation in a c...
Question 227: Joe, an end user, has received a virus detection warning. Wh...
Question 228: Using a protocol analyzer, a security consultant was able to...
Question 229: Which of the following assessment techniques would a securit...
Question 230: Which of the following is considered a risk management BEST ...
Question 231: A security administrator discovered that all communication o...
Question 232: Which of the following uses both a public and private key?...
Question 233: A company has purchased an application that integrates into ...
Question 234: A company executive's laptop was compromised, leading to a s...
Question 235: Joe, the information security manager, is tasked with calcul...
Question 236: Which of the following is public keys used for?...
Question 237: An administrator is configuring a network for all users in a...
Question 238: During a recent audit, the auditors cited the company's curr...
Question 239: Which of the following application attacks is used against a...
Question 240: Which of the following would provide the STRONGEST encryptio...
Question 241: A switch is set up to allow only 2 simultaneous MAC addresse...
Question 242: The ore-sales engineering team needs to quickly provide accu...
Question 243: DRAG DROP Determine the types of attacks below by selecting ...
Question 244: Matt, an administrator, is concerned about the wireless netw...
Question 245: An administrator receives a security alert that appears to b...
Question 246: An administrator is having difficulty configuring WPA2 Enter...
Question 247: Matt, a security administrator, wants to ensure that the mes...
Question 248: Which of the following should a security technician implemen...
Question 249: Maintenance workers find an active network switch hidden abo...
Question 250: A Company has recently identified critical systems that supp...
Question 251: Which of the following best describes the reason for using h...
Question 252: Joe, a network administrator, is able to manage the backup s...
Question 253: A network administrator, Joe, arrives at his new job to find...
Question 254: All of the following are valid cryptographic hash functions ...
Question 255: The database server used by the payroll system crashed at 3 ...
Question 256: An IT security technician needs to establish host based secu...
Question 257: Which of the following wireless protocols could be vulnerabl...
Question 258: A user attempts to install new and relatively unknown softwa...
Question 259: Which of the following provides a static record of all certi...
Question 260: A network administrator is configuring access control for th...
Question 261: A security administrator must implement a secure key exchang...
Question 262: A server crashes at 6 pm. Senior management has determined t...
Question 263: A BYOD policy in which employees are able to access the wire...
Question 264: While an Internet café a malicious user is causing all surro...
Question 265: Which of the following incident response plan steps would MO...
Question 266: Which of the following attacks would cause all mobile device...
Question 267: A webpage displays a potentially offensive advertisement on ...
Question 268: A security technician received notification of a remotely ex...
Question 269: HOTSPOT Select the appropriate attack from each drop down li...
Question 270: A security administrator is auditing a database server to en...
Question 271: A technician reports a suspicious individual is seen walking...
Question 272: Which of the following utilities can be used in Linux to vie...
Question 273: During a routine configuration audit, a systems administrato...
Question 274: Highly sensitive data is stored in a database and is accesse...
Question 275: A company is rolling out a new e-commerce website. The secur...
Question 276: Which of the following will help prevent smurf attacks?...
Question 277: Joe, the system administrator, has been asked to calculate t...
Question 278: Encryption used by RADIUS is BEST described as:...
Question 279: Joe a company's new security specialist is assigned a role t...
Question 280: Which of the following is true about an email that was signe...
Question 281: Jane, an IT security technician, needs to create a way to se...
Question 282: Which of the following types of attacks involves interceptio...
Question 283: An online store wants to protect user credentials and credit...
Question 284: Joe has hired several new security administrators and have b...
Question 285: A security administrator is reviewing the company's continui...
Question 286: A company's application is hosted at a data center. The data...
Question 287: The chief security officer (CSO) has reported a rise in data...
Question 288: A network administrator recently updated various network dev...
Question 289: Digital signatures are used for ensuring which of the follow...
Question 290: The finance department just procured a software application ...
Question 291: A user commuting to work via public transport received an of...
Question 292: A company has 5 users. Users 1, 2 and 3 need access to payro...
Question 293: A security Operations Center was scanning a subnet for infec...
Question 294: A malicious user has collected the following list of informa...
Question 295: Which of the following provides data the best fault toleranc...
Question 296: A security analyst must ensure that the company's web server...
Question 297: Which of the following protocols encapsulates an IP packet w...
Question 298: RC4 is a strong encryption protocol that is generally used w...
Question 299: A server with the IP address of 10.10.2.4 has been having in...
Question 300: A company requires that all wireless communication be compli...
Question 301: A server administrator discovers the web farm is using weak ...
Question 302: Which of the following disaster recovery strategies has the ...
Question 303: Which of the following practices reduces the management burd...
Question 304: After analyzing and correlating activity from multiple senso...
Question 305: Which of the following authentication methods can use the SC...
Question 306: Which of the following is the BEST reason for placing a pass...
Question 307: An employee in the accounting department recently received a...
Question 308: During an audit, the security administrator discovers that t...
Question 309: A security administrator needs a locally stored record to re...
Question 310: Which of the following application security testing techniqu...
Question 311: Which of the following techniques can be used to prevent the...
Question 312: When confidentiality is the primary concern, and a secure ch...
Question 313: Users can authenticate to a company's web applications using...
Question 314: Joe, the chief technical officer (CTO) is concerned that the...
Question 315: Which of the following is the below pseudo-code an example o...
Question 316: A security administrator wants to deploy security controls t...
Question 317: Which of the following wireless security measures can an att...
Question 318: A security director has contracted an outside testing compan...
Question 319: Which of the following is considered an environmental contro...
Question 320: Which of the following is an example of establishing a publi...
Question 321: Which of the following will allow the live state of the virt...
Question 322: Which of the following is used to certify intermediate autho...
Question 323: Which of the following design components is used to isolate ...
Question 324: Which of the following concepts describes the use of a one-w...
Question 325: Log file analysis on a router reveals several unsuccessful t...
Question 326: Four weeks ago, a network administrator applied a new IDS an...
Question 327: During an anonymous penetration test, Jane, a system adminis...
Question 328: An administrator has to determine host operating systems on ...
Question 329: Sara, a security administrator, is noticing a slowdown in th...
Question 330: Which of the following best describes the objectives of succ...
Question 331: The security administrator receives a service ticket saying ...
Question 332: An administrator has advised against the use of Bluetooth ph...
Question 333: Which of the following types of attacks is based on coordina...
Question 334: A Chief Privacy Officer, Joe, is concerned that employees ar...
Question 335: Which of the following ciphers would be BEST used to encrypt...
Question 336: Company A submitted a bid on a contract to do work for Compa...
Question 337: Ann, a security administrator at a call center, has been exp...
Question 338: A security technician is attempting to access a wireless net...
Question 339: The recovery agent is used to recover the:...
Question 340: A security administrator would like the corporate webserver ...
Question 341: Which of the following BEST describes a SQL Injection attack...
Question 342: After connecting to the corporate network a user types the U...
Question 343: A system administrator is configuring shared secrets on serv...
Question 344: A network administrator has purchased two devices that will ...
Question 345: A one-time security audit revealed that employees do not hav...
Question 346: A company hosts a web server that requires entropy in encryp...
Question 347: Which of the following technologies when applied to android ...
Question 348: Company policy requires employees to change their passwords ...
Question 349: Which of the following provides the strongest authentication...
Question 350: The system administrator is reviewing the following logs fro...
Question 351: Users need to exchange a shared secret to begin communicatin...
Question 352: When designing a corporate NAC solution, which of the follow...
Question 353: The internal audit group discovered that unauthorized users ...
Question 354: Sara, a security architect, has developed a framework in whi...
Question 355: Which of the following password attacks involves attempting ...
Question 356: A user, Ann, is reporting to the company IT support group th...
Question 357: The security administrator is analyzing a user's history fil...
Question 358: A software developer wants to prevent stored passwords from ...
Question 359: During a company-wide initiative to harden network security,...
Question 360: A company would like to take electronic orders from a partne...
Question 361: Which of the following can only be mitigated through the use...
Question 362: An administrator was asked to review user accounts. Which of...
Question 363: A system security analyst using an enterprise monitoring too...
Question 364: A recent review of accounts on various systems has found tha...
Question 365: After a user performed a war driving attack, the network adm...
Question 366: The security manager wants to unify the storage of credentia...
Question 367: A malicious individual used an unattended customer service k...
Question 368: Ann, the software security engineer, works for a major softw...
Question 369: A project team is developing requirements of the new version...
Question 370: Which of the following may be used with a BNC connector?...
Question 371: Ann, a security administrator, is strengthening the security...
Question 372: A system administrator has been instructed by the head of se...
Question 373: Which of the following malware types is MOST likely to execu...
Question 374: Which of the following is used to verify data integrity?...
Question 375: Which of the following is where an unauthorized device is fo...
Question 376: After a production outage, which of the following documents ...
Question 377: A database administrator receives a call on an outside telep...
Question 378: A security administrator must implement all requirements in ...
Question 379: A bank has recently deployed mobile tablets to all loan offi...
Question 380: Which of the following can be performed when an element of t...
Question 381: While preparing for an audit a security analyst is reviewing...
Question 382: Which of the following authentication provides users XML for...
Question 383: Which of the following protocols is vulnerable to man-in-the...
Question 384: Joe is the accounts payable agent for ABC Company. Joe has b...
Question 385: An administrator has two servers and wants them to communica...
Question 386: A risk assessment team is concerned about hosting data with ...
Question 387: Which of the following provides additional encryption streng...
Question 388: Which of the following may significantly reduce data loss if...
Question 389: A system administrator is conducting baseline audit and dete...
Question 390: While opening an email attachment, Pete, a customer, receive...
Question 391: Sara, a user, downloads a keygen to install pirated software...
Question 392: The IT department noticed that there was a significant decre...
Question 393: Upper management decides which risk to mitigate based on cos...
Question 394: When reviewing a digital certificate for accuracy, which of ...
Question 395: An attacker is attempting to insert malicious code into an i...
Question 396: Joe, a company's network engineer, is concerned that protoco...
Question 397: Which of the following protocols provides transport security...
Question 398: A company has two server administrators that work overnight ...
Question 399: Which of the following, if properly implemented, would preve...
Question 400: In performing an authorized penetration test of an organizat...
Question 401: Which of the following BEST describes the type of attack tha...
Question 402: Protecting the confidentiality of a message is accomplished ...
Question 403: Which of the following tools will allow a technician to dete...
Question 404: Purchasing receives a phone call from a vendor asking for a ...
Question 405: Which of the following can be used by a security administrat...
Question 406: During a security assessment, an administrator wishes to see...
Question 407: A security administrator is aware that a portion of the comp...
Question 408: Which of the following types of cryptography should be used ...
Question 409: Which of the following file systems is from Microsoft and wa...
Question 410: An administrator has successfully implemented SSL on srv4.co...
Question 411: Users in the HR department were recently informed that they ...
Question 412: Which of the following passwords is the LEAST complex?...
Question 413: Which of the following controls can be implemented together ...
Question 414: A user, Ann, has been issued a smart card and is having prob...
Question 415: The IT department has installed new wireless access points b...
Question 416: At the outside break area, an employee, Ann, asked another e...
Question 417: Deploying a wildcard certificate is one strategy to:...
Question 418: A password audit has revealed that a significant percentage ...
Question 419: RC4 is a strong encryption protocol that is general used wit...
Question 420: Which of the following is the best practice for error and ex...
Question 421: In order to maintain oversight of a third party service prov...
Question 422: Various employees have lost valuable customer data due to ha...
Question 423: Ann, a software developer, has installed some code to reacti...
Question 424: Use of group accounts should be minimized to ensure the foll...
Question 425: A computer supply company is located in a building with thre...
Question 426: Sara, a security analyst, is trying to prove to management w...
Question 427: When employees that use certificates leave the company they ...
Question 428: Which of the following provides the BEST application availab...
Question 429: Joe, the system administrator, is setting up a wireless netw...
Question 430: An administrator notices an unusual spike in network traffic...
Question 431: A bank is planning to implement a third factor to protect cu...
Question 432: Which of the following cryptographic algorithms is MOST ofte...
Question 433: A system administrator has noticed vulnerability on a high i...
Question 434: A security engineer is tasked with encrypting corporate emai...
Question 435: An organization has an internal PKI that utilizes client cer...
Question 436: The security manager reports that the process of revoking ce...
Question 437: Which of the following pseudocodes can be used to handle pro...
Question 438: Which of the following is BEST utilized to identify common m...
Question 439: A network engineer is configuring a VPN tunnel connecting a ...
Question 440: Based on information leaked to industry websites, business m...
Question 441: One of the most consistently reported software security vuln...
Question 442: Ann is starting a disaster recovery program. She has gathere...
Question 443: After running into the data center with a vehicle, attackers...
Question 444: Which of the following was launched against a company based ...
Question 445: ABC company has a lot of contractors working for them. The p...
Question 446: Ann, a security analyst, has discovered that her company has...
Question 447: Which of the following is the GREATEST security concern of a...
Question 448: Which of the following explains the difference between a pub...
Question 449: Jane has recently implemented a new network design at her or...
Question 450: Which of the following implementation steps would be appropr...
Question 451: A company wants to prevent unauthorized access to its secure...
Question 452: Which of the following can BEST help prevent cross-site scri...
Question 453: Which of the following describes the process of removing unn...
Question 454: An administrator is investigating a system that may potentia...
Question 455: One of the senior managers at a company called the help desk...
Question 456: A hacker has discovered a simple way to disrupt business for...
Question 457: A security administrator wishes to prevent certain company d...
Question 458: A user has unknowingly gone to a fraudulent site. The securi...
Question 459: A program has been discovered that infects a critical Window...
Question 460: The Quality Assurance team is testing a third party applicat...
Question 461: A security audit identifies a number of large email messages...
Question 462: Which of the following is the practice of marking open wirel...
Question 463: Although a vulnerability scan report shows no vulnerabilitie...
Question 464: Which of the following is the best practice to put at the en...
Question 465: Which of the following authentication services combines auth...
Question 466: A security analyst has a sample of malicious software and ne...
Question 467: A system administrator has concerns regarding their users ac...
Question 468: Due to hardware limitation, a technician must implement a wi...
Question 469: A technician is configuring a switch to support VOPIP phones...
Question 470: A security administrator needs to implement a technology tha...
Question 471: Which of the following must be kept secret for a public key ...
Question 472: Which of the following describes purposefully injecting extr...
Question 473: After copying a sensitive document from his desktop to a fla...
Question 474: A network security engineer notices unusual traffic on the n...
Question 475: A recent online password audit has identified that stale acc...
Question 476: In an environment where availability is critical such as Ind...
Question 477: Which of the following devices is BEST suited for servers th...
Question 478: Public key certificates and keys that are compromised or wer...
Question 479: Which of the following is characterized by an attacker attem...
Question 480: Which of the following should an administrator implement to ...
Question 481: Which of the following types of trust models is used by a PK...
Question 482: The IT department has setup a website with a series of quest...
Question 483: Which of the following is characterized by an attack against...
Question 484: A security administrator suspects that an employee in the IT...
Question 485: A user attempting to log on to a workstation for the first t...
Question 486: An organization currently uses FTP for the transfer of large...
Question 487: Users at a company report that a popular news website keeps ...
Question 488: Ann is traveling for business and is attempting to use the h...
Question 489: A security administrator is concerned about the strength of ...
Question 490: How often, at a MINIMUM, should Sara, an administrator, revi...
Question 491: A company has recently begun to provide internal security aw...
Question 492: Which of the following will allow Pete, a security analyst, ...
Question 493: Which of the following would a security administrator implem...
Question 494: Which of the following is a penetration testing method?...
Question 495: A bank Chief Information Security Officer (CISO) is responsi...
Question 496: Which of the following types of technologies is used by secu...
Question 497: Without validating user input, an application becomes vulner...
Question 498: A company needs to provide a secure backup mechanism for key...
Question 499: After Matt, a user, enters his username and password at the ...
Question 500: A company's Chief Information Officer realizes the company c...
Question 501: The marketing department wants to distribute pens with embed...
Question 502: A security administrator at a company which implements key e...
Question 503: Ann, a newly hired human resource employee, sent out confide...
Question 504: Human Resources suspects an employee is accessing the employ...
Question 505: A security administrator notices large amounts of traffic wi...
Question 506: A server administrator notes that a fully patched applicatio...
Question 507: Joe, an employee, was escorted from the company premises due...
Question 508: A company has identified a watering hole attack. Which of th...
Question 509: Which of the following can be implemented with multiple bit ...
Question 510: Which of the following metrics is important for measuring th...
Question 511: A new security analyst is given the task of determining whet...
Question 512: Which of the following BEST describes a protective counterme...
Question 513: Several users' computers are no longer responding normally a...
Question 514: Vendors typically ship software applications with security s...
Question 515: If Organization A trusts Organization B and Organization B t...
Question 516: Users are utilizing thumb drives to connect to USB ports on ...
Question 517: A security administrator must implement a system to allow cl...
Question 518: A network administrator was to implement a solution that wil...
Question 519: One of the findings of risk assessment is that many of the s...
Question 520: Which of the following means a password history value of thr...
Question 521: An administrator has concerns regarding the company's server...
Question 522: The BEST methods for a web developer to prevent the website ...
Question 523: Which of the following symmetric key algorithms are examples...
Question 524: The security administrator is implementing a malware storage...
Question 525: Users report that after downloading several applications, th...
Question 526: A small company has a website that provides online customer ...
Question 527: A risk management team indicated an elevated level of risk d...
Question 528: A small company has recently purchased cell phones for manag...
Question 529: An administrator implements SELinux on a production web serv...
Question 530: A company uses PGP to ensure that sensitive email is protect...
Question 531: The access control list (ACL) for a file on a server is as f...
Question 532: HOTSPOT For each of the given items, select the appropriate ...
Question 533: Which of the following controls can be used to prevent the d...
Question 534: Which of the following forms of software testing can best be...
Question 535: Which of the following identifies certificates that have bee...
Question 536: Which of the following risk concepts requires an organizatio...
Question 537: A security analyst has been notified that trade secrets are ...
Question 538: During a server audit, a security administrator does not not...
Question 539: Company A and Company B both supply contractual services to ...
Question 540: Which of the following steps of incident response does a tea...
Question 541: Which of the following is an example of a false positive?...
Question 542: The system administrator notices that many employees are usi...
Question 543: Which of the following offers the LEAST secure encryption ca...
Question 544: Ann a security technician receives a report from a user that...
Question 545: A chief information officer (CIO) is concerned about PII con...
Question 546: Which of the following is true about PKI? (Choose two.)...
Question 547: The key management organization has implemented a key escrow...
Question 548: A company's chief information officer (CIO) has analyzed the...
Question 549: A classroom utilizes workstations running virtualization sof...
Question 550: An application developer needs to allow employees to use the...
Question 551: Several employee accounts appear to have been cracked by an ...
Question 552: Two organizations want to share sensitive data with one anot...
Question 553: A small business needs to incorporate fault tolerance into t...
Question 554: During a penetration test from the Internet, Jane, the syste...
Question 555: An administrator needs to submit a new CSR to a CA. Which of...
Question 556: Which of the following is an important implementation consid...
Question 557: Pete, the security administrator, has been notified by the I...
Question 558: Sara, a hacker, is completing a website form to request a fr...
Question 559: To ensure compatibility with their flagship product, the sec...
Question 560: The security consultant is assigned to test a client's new s...
Question 561: The chief Risk officer is concerned about the new employee B...
Question 562: A computer is found to be infected with malware and a techni...
Question 563: A recent spike in virus detections has been attributed to en...
Question 564: A user was reissued a smart card after the previous smart ca...
Question 565: A company would like to implement two-factor authentication ...
Question 566: Which of the following is a black box testing methodology?...
Question 567: Which of the following is true about asymmetric encryption?...
Question 568: Which of the following BEST describes malware that tracks a ...
Question 569: Which of the following provides Digital Signatures?...
Question 570: A company is deploying a new video conferencing system to be...
Question 571: An administrator deploys a WPA2 Enterprise wireless network ...
Question 572: Pete, the security engineer, would like to prevent wireless ...
Question 573: Sara, the Chief Information Officer (CIO), has requested an ...
Question 574: An administrator performs a risk calculation to determine if...
Question 575: Joe, an employee is taking a taxi through a busy city and st...
Question 576: A company has just deployed a centralized event log storage ...
Question 577: The chief security officer (CSO) has issued a new policy to ...
Question 578: Which of the following concepts is enforced by certifying th...
Question 579: A security manager installed a standalone fingerprint reader...
Question 580: A network inventory discovery application requires non-privi...
Question 581: A CRL is comprised of.
Question 582: A Company transfers millions of files a day between their se...
Question 583: A security administrator wants to test the reliability of an...
Question 584: Which of the following BEST allows Pete, a security administ...
Question 585: A company wishes to prevent unauthorized employee access to ...
Question 586: Which of the following is it MOST difficult to harden agains...
Question 587: Fuzzing is a security assessment technique that allows teste...
Question 588: Which of the following is a measure of biometrics performanc...
Question 589: Which of the following attacks could be used to initiate a s...
Question 590: The sales force in an organization frequently travel to remo...
Question 591: A user attempts to install a new and relatively unknown soft...
Question 592: A recent audit of a company's identity management system sho...
Question 593: An email client says a digital signature is invalid and the ...
Question 594: The Chief Executive Officer (CEO) Joe notices an increase in...
Question 595: A security administrator is designing an access control syst...
Question 596: A supervisor in the human resources department has been give...
Question 597: The string: ' or 1=1-- - Which of the following represents i...
Question 598: Which of the following concepts is used by digital signature...
Question 599: Matt, a developer, recently attended a workshop on a new app...
Question 600: Matt, a forensic analyst, wants to obtain the digital finger...
Question 601: A new intern was assigned to the system engineering departme...
Question 602: A software development company has hired a programmer to dev...
Question 603: A certificate used on an e-commerce web server is about to e...
Question 604: Which of the following can be used to ensure that sensitive ...
Question 605: Joe, a network administrator, is setting up a virtualization...
Question 606: An administrator notices that former temporary employees' ac...
Question 607: Which of the following provides the LEAST availability?...
Question 608: In order to enter a high-security data center, users are req...
Question 609: An attacker impersonates a fire marshal and demands access t...
Question 610: A security administrator has just finished creating a hot si...
Question 611: Users are trying to communicate with a network but are unabl...
Question 612: An IT auditor tests an application as an authenticated user....
Question 613: A company is starting to allow employees to use their own pe...
Question 614: Which of the following access methods uses radio frequency w...
Question 615: Which of the following is the MOST specific plan for various...
Question 616: A resent OS patch caused an extended outage. It took the IT ...
Question 617: A file on a Linux server has default permissions of rw-rw-r-...
Question 618: A vulnerability assessment indicates that a router can be ac...
Question 619: Pete, an employee, is terminated from the company and the le...
Question 620: Which of the following would BEST be used to calculate the e...
Question 621: In order to gain an understanding of the latest attack tools...
Question 622: Which of the following describes the implementation of PAT?...
Question 623: Which of the following would BEST deter an attacker trying t...
Question 624: A corporation has experienced several media leaks of proprie...
Question 625: A technician has been assigned a service request to investig...
Question 626: Sara, a security administrator, manually hashes all network ...
Question 627: An administrator finds that non-production servers are being...
Question 628: Physical documents must be incinerated after a set retention...
Question 629: A security administrator would like to ensure that system ad...
Question 630: A company is concerned that a compromised certificate may re...
Question 631: Which of the following tasks should key elements of a busine...
Question 632: All executive officers have changed their monitor location s...
Question 633: Which of the following would Jane, an administrator, use to ...
Question 634: A company recently received accreditation for a secure netwo...
Question 635: Which of the following MUST be updated immediately when an e...
Question 636: Which of the following is BEST used to capture and analyze n...
Question 637: Joe, the system administrator, is performing an overnight sy...
Question 638: Which of the following application security principles invol...
Question 639: Ann is the data owner of financial records for a company. Sh...
Question 640: A security technician is concerned there4 is not enough secu...
Question 641: Matt, an IT administrator, wants to protect a newly built se...
Question 642: A load balancer has the ability to remember which server a p...
Question 643: A rogue programmer included a piece of code in an applicatio...
Question 644: The security administrator notices a user logging into a cor...
Question 645: Which of the following techniques enables a highly secured o...
Question 646: Using proximity card readers instead of the traditional key ...
Question 647: A way to assure data at-rest is secure even in the event of ...
Question 648: A company hires a penetration testing team to test its overa...
Question 649: The Chief Information Officer (CIO) wants to implement a red...
Question 650: An administrator, Ann, wants to ensure that only authorized ...
Question 651: A programmer has allocated a 32-bit variable to store the re...
Question 652: Which of the following attacks impact the availability of a ...
Question 653: Which of the following can Pete, a security administrator, u...
Question 654: Pete, the Chief Executive Officer (CEO) of a company, has in...
Question 655: It is important to staff who use email messaging to provide ...
Question 656: A new MPLS network link has been established between a compa...
Question 657: Which of the following provides the HIGHEST level of confide...
Question 658: An attacker unplugs the access point at a coffee shop. The a...
Question 659: A network administrator argues that WPA2 encryption is not n...
Question 660: A program displays: ERROR: this program has caught an except...
Question 661: Which of the following exploits either a host file on a targ...
Question 662: Ann has recently transferred from the payroll department to ...
Question 663: During a routine audit it is discovered that someone has bee...
Question 664: Which of the following is a software vulnerability that can ...
Question 665: Sara, an application developer, implemented error and except...
Question 666: Which of the following is the MOST likely cause of users bei...
Question 667: A video surveillance audit recently uncovered that an employ...
Question 668: Pete, the system administrator, has concerns regarding users...
Question 669: Which of the following can Joe, a security administrator, im...
Question 670: Which of the following application attacks is used to gain a...
Question 671: Which of the following attacks allows access to contact list...
Question 672: A business has recently adopted a policy allowing employees ...
Question 673: Which of the following is described as an attack against an ...
Question 674: Which of the following will provide data encryption, key man...
Question 675: An employee's mobile device associates with the company's gu...
Question 676: Which of the following controls mitigates the risk of Matt, ...
Question 677: The Chief Security Officer (CSO) for a datacenter in a hosti...
Question 678: A security administrator has been tasked with assisting in t...
Question 679: Ann, the network administrator, has learned from the helpdes...
Question 680: Joe, an application developer, is building an external facin...
Question 681: Ann, the Chief Technology Officer (CTO), has agreed to allow...
Question 682: Several users report to the administrator that they are havi...
Question 683: The IT department has been tasked with reducing the risk of ...
Question 684: Joe, a web developer, wants to make sure his application is ...
Question 685: Ann wants to send a file to Joe using PKI. Which of the foll...
Question 686: An organization processes credit card transactions and is co...
Question 687: A technician wants to secure communication to the corporate ...
Question 688: A security engineer is asked by the company's development te...
Question 689: A web administrator has just implemented a new web server to...
Question 690: Which of the following concepts allows an organization to gr...
Question 691: A company has recently allowed employees to take advantage o...
Question 692: Data execution prevention is a feature in most operating sys...
Question 693: Which of the following represents a cryptographic solution w...
Question 694: An administrator is instructed to disable IP-directed broadc...
Question 695: A system administrator has noticed network performance issue...
Question 696: A technician has deployed a new VPN concentrator. The device...
Question 697: Which of the following types of application attacks would be...
Question 698: A security administrator is reviewing the below output from ...
Question 699: Which of the following BEST describes disk striping with par...
Question 700: A security analyst implemented group-based privileges within...
Question 701: Which of the following can be used to ensure digital certifi...
Question 702: A network technician has received comments from several user...
Question 703: Which of the following is true about the recovery agent?...
Question 704: An IT security technician is actively involved in identifyin...
Question 705: A system administrator needs to ensure that certain departme...
Question 706: After encrypting all laptop hard drives, an executive office...
Question 707: In order to use a two-way trust model the security administr...
Question 708: Users are encouraged to click on a link in an email to obtai...
Question 709: Which of the following would a security administrator implem...
Question 710: Pete, a security analyst, has been tasked with explaining th...
Question 711: A large multinational corporation with networks in 30 countr...
Question 712: An administrator is concerned that a company's web server ha...
Question 713: A new security policy being implemented requires all email w...
Question 714: Which of the following risks could IT management be mitigati...
Question 715: Which of the following would an attacker use to generate and...
Question 716: A security administrator wants to get a real time look at wh...
Question 717: Which of the following would be used as a secure substitute ...
Question 718: A bank has a fleet of aging payment terminals used by mercha...
Question 719: A small IT security form has an internal network composed of...
Question 720: A security administrator is notified that users attached to ...
Question 721: The Chief Information Officer (CIO) has asked a security ana...
Question 722: Attempting to inject 50 alphanumeric key strokes including s...
Question 723: Joe, a user, in a coffee shop is checking his email over a w...
Question 724: An administrator uses a server with a trusted OS and is conf...
Question 725: A security administrator forgets their card to access the se...
Question 726: When creating a public / private key pair, for which of the ...
Question 727: A security administrator wants to check user password comple...
Question 728: Which of the following security concepts identifies input va...
Question 729: Which of the following malware types typically allows an att...
Question 730: Mobile tablets are used by employees on the sales floor to a...
Question 731: A security engineer would like to analyze the effect of depl...
Question 732: One of the servers on the network stops responding due to la...
Question 733: Which of the following is used by the recipient of a digital...
Question 734: During a disaster recovery planning session, a security admi...
Question 735: Which of the following should be used to authenticate and lo...
Question 736: Joe, a user, wants to send an encrypted email to Ann. Which ...
Question 737: The public key is used to perform the following: (Choose thr...
Question 738: Joe must send Ann a message and provide Ann with assurance t...
Question 739: A network administrator noticed various chain messages have ...
Question 740: A network administrator has identified port 21 being open an...
Question 741: Which of the following authentication protocols makes use of...
Question 742: Which of the following is BEST utilized to actively test sec...
Question 743: An outside security consultant produces a report of several ...
Question 744: A security manager requires fencing around the perimeter, an...
Question 745: Which of the following is the BEST concept to maintain requi...
Question 746: Customers' credit card information was stolen from a popular...
Question 747: An auditing team has found that passwords do not meet the be...
Question 748: A security administrator has concerns that employees are ins...
Question 749: A network analyst received a number of reports that imperson...
Question 750: A company replaces a number of devices with a mobile applian...
Question 751: A datacenter has suffered repeated burglaries which led to e...
Question 752: Purchasing receives an automated phone call from a bank aski...
Question 753: Which of the following is the BEST technology for the sender...
Question 754: Which of the following cryptographic methods is most secure ...
Question 755: A security analyst discovered data such as images and word d...
Question 756: After recovering from a data breach in which customer data w...
Question 757: On a train, an individual is watching a proprietary video on...
Question 758: A security administrator must implement a network that is im...
Question 759: Which of the following are unique to white box testing metho...
Question 760: Which of the following types of cloud computing would be MOS...
Question 761: Suspicious traffic without a specific signature was detected...
Question 762: If an organization wants to implement a BYOD policy, which o...
Question 763: A security technician at a small business is worried about t...
Question 764: In which of the following scenarios is PKI LEAST hardened?...
Question 765: A computer security officer has investigated a possible data...
Question 766: Which of the following BEST represents the goal of a vulnera...
Question 767: A new network administrator is setting up a new file server ...
Question 768: Matt, the Chief Information Security Officer (CISO), tells t...
Question 769: Account lockout is a mitigation strategy used by Jane, the a...
Question 770: Which of the following could cause a browser to display the ...
Question 771: A user has called the help desk to report an enterprise mobi...
Question 772: Which of the following allows lower level domains to access ...
Question 773: After visiting a website, a user receives an email thanking ...
Question 774: When using PGP, which of the following should the end user p...
Question 775: A network administrator is looking for a way to automaticall...
Question 776: Which of the following concepts defines the requirement for ...
Question 777: Company XYZ has encountered an increased amount of buffer ov...
Question 778: A company used a partner company to develop critical compone...
Question 779: Which of the following network devices is used to analyze tr...
Question 780: The help desk is experiencing a higher than normal amount of...
Question 781: The Quality Assurance team is testing a new third party deve...
Question 782: Which of the following transportation encryption protocols s...
Question 783: Which of the following cryptographic related browser setting...
Question 784: Which of the following is an application security coding pro...
Question 785: Using a heuristic system to detect an anomaly in a computer'...
Question 786: A company hosts its public websites internally. The administ...
Question 787: Which of the following security architecture elements also h...
Question 788: An agent wants to create fast and efficient cryptographic ke...
Question 789: An attacker attempted to compromise a web form by inserting ...
Question 790: An attacker has gained access to the company's web server by...
Question 791: What is a system that is intended or designed to be broken i...
Question 792: Jane, a security administrator, has observed repeated attemp...
Question 793: Which of the following allows a network administrator to imp...
Question 794: A large bank has moved back office operations offshore to an...
Question 795: Which of the following is a concern when encrypting wireless...
Question 796: Which of the following actions in PKI takes a certificate au...
Question 797: A small company wants to employ PKI. The company wants a cos...
Question 798: A company has been attacked and their website has been alter...
Question 799: Which of the following types of wireless attacks would be us...
Question 800: Which of the following should Matt, a security administrator...
Question 801: Which of the following may cause Jane, the security administ...
Question 802: Which of the following components MUST be trusted by all par...
Question 803: In order to secure additional budget, a security manager wan...
Question 804: A recently installed application update caused a vital appli...
Question 805: An internal audit has detected that a number of archived tap...
Question 806: Joe, the security administrator, has determined that one of ...
Question 807: The concept of rendering data passing between two points ove...
Question 808: The software developer is responsible for writing the code a...
Question 809: Employees are reporting that they have been receiving a larg...
Question 810: Which of the following would prevent a user from installing ...
Question 811: During a routine audit a web server is flagged for allowing ...
Question 812: SIMULATION A security administrator discovers that an attack...
Question 813: A system security analyst wants to capture data flowing in a...
Question 814: An attacker Joe configures his service identifier to be as a...
Question 815: A security analyst, Ann, is reviewing an IRC channel and not...
Question 816: Which of the following can take advantage of man-in-the-midd...
Question 817: Users have been reporting that their wireless access point i...
Question 818: A process in which the functionality of an application is te...
Question 819: An attacker went to a local bank and collected disposed pape...
Question 820: Which of the following is an indication of an ongoing curren...
Question 821: An administrator needs to renew a certificate for a web serv...
Question 822: An employee reports work was being completed on a company ow...
Question 823: In order for network monitoring to work properly, you need a...
Question 824: Which of the following can use RC4 for encryption? (Choose t...
Question 825: Identifying residual is MOST important to which of the follo...
Question 826: Ann a new small business owner decides to implement WiFi acc...
Question 827: A system administrator is setting up a file transfer server....
Question 828: Which of the following should be used when a business needs ...
Question 829: After an assessment, auditors recommended that an applicatio...
Question 830: Which of the following protocols is the security administrat...
Question 831: Which of the following technologies was developed to allow c...
Question 832: A systems administrator has implemented PKI on a classified ...
Question 833: A new web server has been provisioned at a third party hosti...
Question 834: The main corporate website has a service level agreement tha...
Question 835: Joe, a user, wants to send an encrypted email to Ann. Which ...
Question 836: Two programmers write a new secure application for the human...
Question 837: A company requires that all users enroll in the corporate PK...
Question 838: Corporate IM presents multiple concerns to enterprise IT. Wh...
Question 839: An SSL session is taking place. After the handshake phase ha...
Question 840: A security administrator is using a software program to test...
Question 841: A security administrator needs to determine which system a p...
Question 842: The security administrator installed a newly generated SSL c...
Question 843: When Ann an employee returns to work and logs into her works...
Question 844: The system administrator is tasked with changing the adminis...
Question 845: A company has several public conference room areas with expo...
Question 846: A security administrator wants to deploy a physical security...
Question 847: In regard to secure coding practices, why is input validatio...
Question 848: An administrator has a network subnet dedicated to a group o...
Question 849: Which of the following is the MOST intrusive type of testing...
Question 850: After receiving the hard drive from detectives, the forensic...
Question 851: A security administrator is investigating a recent server br...
Question 852: A company is looking to improve their security posture by ad...
Question 853: In an effort to test the effectiveness of an organization's ...
Question 854: Ann, the security administrator, received a report from the ...
Question 855: An investigator recently discovered that an attacker placed ...
Question 856: Users in an organization are experiencing when attempting to...
Question 857: A corporate wireless guest network uses an open SSID with a ...
Question 858: An insurance company requires an account recovery process so...
Question 859: An organizations' security policy requires that users change...
Question 860: Which of the following can a security administrator implemen...
Question 861: The Chief Information Officer (CIO) receives an anonymous th...
Question 862: The system administrator has been notified that many users a...
Question 863: Ann was reviewing her company's event logs and observed seve...
Question 864: A new client application developer wants to ensure that the ...
Question 865: An organization's security policy states that users must aut...
Question 866: Several employees clicked on a link in a malicious message t...
Question 867: A victim is logged onto a popular home router forum site in ...
Question 868: A security technician has been asked to recommend an authent...
Question 869: Which of the following would be used to allow a subset of tr...
Question 870: A thief has stolen mobile device and removed its battery to ...
Question 871: Which of the following can be implemented if a security admi...
Question 872: Which of the following must a user implement if they want to...
Question 873: A system administrator wants to use open source software but...
Question 874: Joe needs to track employees who log into a confidential dat...
Question 875: A user Ann has her assigned token but she forgotten her pass...
Question 876: Which of the following are restricted to 64-bit block sizes?...
Question 877: After a security incident involving a physical asset, which ...
Question 878: Which of the following would a security administrator implem...
Question 879: Company employees are required to have workstation client ce...
Question 880: Which of the following types of malware, attempts to circumv...
Question 881: Sara, an attacker, is recording a person typing in their ID ...
Question 882: An organization must implement controls to protect the confi...
Question 883: A company wants to improve its overall security posture by d...
Question 884: Which of the following are examples of detective controls?...
Question 885: Which of the following would be used to identify the securit...
Question 886: A company wants to ensure that all credentials for various s...
Question 887: The call center supervisor has reported that many employees ...
Question 888: A network administrator identifies sensitive files being tra...
Question 889: Several departments within a company have a business need to...
Question 890: An Information Systems Security Officer (ISSO) has been plac...
Question 891: Allowing unauthorized removable devices to connect to comput...
Question 892: A cafe provides laptops for Internet access to their custome...
Question 893: Client computers login at specified times to check and updat...
Question 894: Joe, a user, reports to the system administrator that he is ...
Question 895: A CA is compromised and attacks start distributing malicious...
Question 896: Joe analyzed the following log and determined the security t...
Question 897: Ann a new security specialist is attempting to access the in...
Question 898: A security administrator discovers an image file that has se...
Question 899: A university has a building that holds the power generators ...
Question 900: A server administrator notes that a legacy application often...