<< Prev Question Next Question >>

Question 6/900

Ann, a security administrator at a call center, has been experiencing problems with users intentionally installing unapproved and occasionally malicious software on their computers. Due to the nature of their jobs, Ann cannot change their permissions. Which of the following would BEST alleviate her concerns?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (900q)
Question 1: Which of the following is an attack designed to activate bas...
Question 2: Which of the following allows a company to maintain access t...
Question 3: A security administrator is tasked with calculating the tota...
Question 4: A company has a corporate infrastructure where end users man...
Question 5: An administrator discovers that many users have used their s...
Question 6: Ann, a security administrator at a call center, has been exp...
Question 7: Jane, an individual, has recently been calling various finan...
Question 8: An administrator must select an algorithm to encrypt data at...
Question 9: A security technician has been tasked with opening ports on ...
Question 10: Symmetric encryption utilizes __________, while asymmetric e...
Question 11: Ann, a security analyst, is preparing for an upcoming securi...
Question 12: Which of the following is commonly LDAP and Kerberos used fo...
Question 13: An attacker used an undocumented and unknown application exp...
Question 14: After viewing wireless traffic, an attacker notices the foll...
Question 15: An application developer has coded a new application with a ...
Question 16: A company's security administrator wants to manage PKI for i...
Question 17: Input validation is an important security defense because it...
Question 18: An organization is required to log all user internet activit...
Question 19: A network stream needs to be encrypted. Sara, the network ad...
Question 20: When information is shared between two separate organization...
Question 21: Which of the following documents outlines the technical and ...
Question 22: The security administrator generates a key pair and sends on...
Question 23: A security administrator is selecting an MDM solution for an...
Question 24: An organization is implementing a password management applic...
Question 25: Sara, a security engineer, is testing encryption ciphers for...
Question 26: A security manager is discussing change in the security post...
Question 27: The security administrator is observing unusual network beha...
Question 28: A network technician is configuring clients for VLAN access....
Question 29: A company plans to expand by hiring new engineers who work i...
Question 30: Which of the following is an attack designed to activate bas...
Question 31: An attacker crafts a message that appears to be from a trust...
Question 32: Sara, a security manager, has decided to force expiration of...
Question 33: Given the following list of corporate access points, which o...
Question 34: A company has had several security incidents in the past six...
Question 35: Failure to validate the size of a variable before writing it...
Question 36: A financial company requires a new private network link with...
Question 37: The security administrator runs an rpm verify command which ...
Question 38: A security technician wants to implement stringent security ...
Question 39: Which of the following BEST describes part of the PKI proces...
Question 40: A security administrator must implement a system that will s...
Question 41: Ann an employee is visiting Joe, an employee in the Human Re...
Question 42: Which of the following protocols is MOST likely to be levera...
Question 43: Mike, a user, states that he is receiving several unwanted e...
Question 44: A software firm posts patches and updates to a publicly acce...
Question 45: After Ann, a user, logs into her banking websites she has ac...
Question 46: Given the following set of firewall rules: From the inside t...
Question 47: A company recently experienced several security breaches tha...
Question 48: Joe the system administrator has noticed an increase in netw...
Question 49: The Chief Security Officer (CSO) is contacted by a first res...
Question 50: A company recently experienced data loss when a server crash...
Question 51: A router was shut down as a result of a DoS attack. Upon rev...
Question 52: In order to securely communicate using PGP, the sender of an...
Question 53: Internet banking customers currently use an account number a...
Question 54: An auditor's report discovered several accounts with no acti...
Question 55: Which of the following would MOST likely involve GPS?...
Question 56: A quality assurance analyst is reviewing a new software prod...
Question 57: Which of the following BEST describes the type of attack tha...
Question 58: Joe, a user, wants to protect sensitive information stored o...
Question 59: A system administrator is notified by a staff member that th...
Question 60: Ann a network administrator has been tasked with strengtheni...
Question 61: Jane, a security analyst, is reviewing logs from hosts acros...
Question 62: An administrator is implementing a new management system for...
Question 63: Which of the following MUST Matt, a security administrator, ...
Question 64: Which of the following practices is used to mitigate a known...
Question 65: A website is breached, exposing the usernames and MD5 passwo...
Question 66: A new mobile banking application is being developed and uses...
Question 67: A security administrator wants to block unauthorized access ...
Question 68: A user has plugged in a wireless router from home with defau...
Question 69: A chief information security officer (CISO) is providing a p...
Question 70: A network manager needs a cost-effective solution to allow f...
Question 71: Which of the following describes how Sara, an attacker, can ...
Question 72: Which of the following is a common coding error in which bou...
Question 73: A recent audit has revealed that several users have retained...
Question 74: Which of the following is the BEST way to prevent Cross-Site...
Question 75: A group of users from multiple departments are working toget...
Question 76: A security administrator has been tasked with setting up a n...
Question 77: Which of the following security benefits would be gained by ...
Question 78: An administrator is implementing a security control that onl...
Question 79: A group policy requires users in an organization to use stro...
Question 80: A systems engineer has been presented with storage performan...
Question 81: In the course of troubleshooting wireless issues from users,...
Question 82: Which of the following software allows a network administrat...
Question 83: A security analyst performs the following activities: monito...
Question 84: A security administrator finds that an intermediate CA withi...
Question 85: A company has experienced problems with their ISP, which has...
Question 86: Which of the following tools would allow Ann, the security a...
Question 87: Which of the following is a notification that an unusual con...
Question 88: Joe, a security analyst, is attempting to determine if a new...
Question 89: The security manager must store a copy of a sensitive docume...
Question 90: A security technician is attempting to improve the overall s...
Question 91: An employee finds a USB drive in the employee lunch room and...
Question 92: During an office move a sever containing the employee inform...
Question 93: Several departments in a corporation have a critical need fo...
Question 94: Certificates are used for: (Choose two.)...
Question 95: A security analyst has a sample of malicious software and ne...
Question 96: A trojan was recently discovered on a server. There are now ...
Question 97: Timestamps and sequence numbers act as countermeasures again...
Question 98: Which of the following protocols is used to validate whether...
Question 99: Pete, a developer, writes an application. Jane, the security...
Question 100: A security administrator is reviewing logs and notices multi...
Question 101: After a recent breach, the security administrator performs a...
Question 102: Which of the following can be utilized in order to provide t...
Question 103: A system administrator has noticed that users change their p...
Question 104: Which of the following types of security controls are visibl...
Question 105: Which of the following functions provides an output which ca...
Question 106: Which of the following authenticate connections using point-...
Question 107: A system administrator wants to prevent password compromises...
Question 108: Pete's corporation has outsourced help desk services to a la...
Question 109: Which of the following is true about the CRL?...
Question 110: How must user accounts for exiting employees be handled?...
Question 111: Four weeks ago a network administrator applied a new IDS and...
Question 112: Which of the following concepts is BEST described as develop...
Question 113: Which of the following protocols uses an asymmetric key to o...
Question 114: Which of the following helps to establish an accurate timeli...
Question 115: Which of the following is the BEST practice when dealing wit...
Question 116: Several bins are located throughout a building for secure di...
Question 117: A security administrator wants to perform routine tests on t...
Question 118: Which of the following types of application attacks would be...
Question 119: A new virtual server was created for the marketing departmen...
Question 120: A malicious individual is attempting to write too much data ...
Question 121: Which of the following assessments would Pete, the security ...
Question 122: Which of the following technical controls helps to prevent S...
Question 123: A security administrator develops a web page and limits inpu...
Question 124: An attacker Joe configures his service identifier to be the ...
Question 125: Recent data loss on financial servers due to security breach...
Question 126: Users report that they are unable to access network printing...
Question 127: To mitigate the risk of intrusion, an IT Manager is concerne...
Question 128: Which of the following attacks involves the use of previousl...
Question 129: Which of the following is a requirement when implementing PK...
Question 130: Ann is a member of the Sales group. She needs to collaborate...
Question 131: A set of standardized system images with a pre-defined set o...
Question 132: Which of the following can hide confidential or malicious da...
Question 133: Which of the following is a best practice when setting up a ...
Question 134: A company's password and authentication policies prohibit th...
Question 135: When an order was submitted via the corporate website, an ad...
Question 136: A security analyst, while doing a security scan using packet...
Question 137: Which of the following is replayed during wireless authentic...
Question 138: Jane, a VPN administrator, was asked to implement an encrypt...
Question 139: Methods to test the responses of software and web applicatio...
Question 140: A business has set up a Customer Service kiosk within a shop...
Question 141: A security administrator must implement a wireless encryptio...
Question 142: Matt, a security consultant, has been tasked with increasing...
Question 143: While working on a new project a security administrator want...
Question 144: Which of the following tests a number of security controls i...
Question 145: Jane has implemented an array of four servers to accomplish ...
Question 146: After an audit, it was discovered that an account was not di...
Question 147: Which of the following internal security controls is aimed a...
Question 148: An employee connects a wireless access point to the only jac...
Question 149: Which of the following BEST explains Platform as a Service?...
Question 150: The security department has implemented a new laptop encrypt...
Question 151: After a company has standardized to a single operating syste...
Question 152: A distributed denial of service attack can BEST be described...
Question 153: Which of the following attacks initiates a connection by sen...
Question 154: A customer has provided an email address and password to a w...
Question 155: Which statement is TRUE about the operation of a packet snif...
Question 156: A security analyst is working on a project team responsible ...
Question 157: Which of the following describes a type of malware which is ...
Question 158: Which of the following malware types may require user intera...
Question 159: After a recent internal audit, the security administrator wa...
Question 160: Which of the following is being tested when a company's payr...
Question 161: Mike, a security professional, is tasked with actively verif...
Question 162: A user has several random browser windows opening on their c...
Question 163: A recent audit has revealed weaknesses in the process of dep...
Question 164: Which of the following is the term for a fix for a known sof...
Question 165: Which of the following would a security administrator implem...
Question 166: A security administrator is responsible for ensuring that th...
Question 167: In PKI, a key pair consists of: (Choose two.)...
Question 168: A company has had their web application become unavailable s...
Question 169: The Chief Information Security Officer (CISO) is concerned t...
Question 170: Which of the following can be used on a smartphone to BEST p...
Question 171: A security administrator examines a network session to a com...
Question 172: Ann, a security administrator is hardening the user password...
Question 173: Which device monitors network traffic in a passive manner?...
Question 174: Which of the following attacks targets high level executives...
Question 175: The process of making certain that an entity (operating syst...
Question 176: The chief information officer (CIO) of a major company inten...
Question 177: A company's employees were victims of a spear phishing campa...
Question 178: Joe, a security technician, is configuring two new firewalls...
Question 179: In the case of a major outage or business interruption, the ...
Question 180: Pete, an employee, needs a certificate to encrypt data. Whic...
Question 181: Matt, a security analyst, needs to select an asymmetric encr...
Question 182: Prior to leaving for an extended vacation, Joe uses his mobi...
Question 183: An administrator is assigned to monitor servers in a data ce...
Question 184: While responding to an incident on a Linux server, the admin...
Question 185: A company hires outside security experts to evaluate the sec...
Question 186: A user casually browsing the Internet is redirected to a war...
Question 187: Which of the following would Matt, a security administrator,...
Question 188: An assessment too reports that the company's web server may ...
Question 189: Which of the following should be done before resetting a use...
Question 190: A security specialist has been asked to evaluate a corporate...
Question 191: After working on his doctoral dissertation for two years, Jo...
Question 192: Company A sends a PGP encrypted file to company B. If compan...
Question 193: Users have reported receiving unsolicited emails in their in...
Question 194: A security manager must remain aware of the security posture...
Question 195: Which of the following ports should be opened on a firewall ...
Question 196: Which of the following tools would a security administrator ...
Question 197: Which of the following is synonymous with a server's certifi...
Question 198: Which of the following devices is used for the transparent s...
Question 199: Searching for systems infected with malware is considered to...
Question 200: Privilege creep among long-term employees can be mitigated b...
Question 201: A technician installed two ground plane antennae on 802.11n ...
Question 202: An incident occurred when an outside attacker was able to ga...
Question 203: Ann, an employee, is cleaning out her desk and disposes of p...
Question 204: Devices on the SCADA network communicate exclusively at Laye...
Question 205: A technician wants to verify the authenticity of the system ...
Question 206: A user has forgotten their account password. Which of the fo...
Question 207: A network administrator is responsible for securing applicat...
Question 208: Which of the following technologies uses multiple devices to...
Question 209: Ann, the system administrator, is installing an extremely cr...
Question 210: Some customers have reported receiving an untrusted certific...
Question 211: An employee from the fire Marshall's office arrives to inspe...
Question 212: Which of the following allows an organization to store a sen...
Question 213: Which of the following is primarily used to provide fault to...
Question 214: The Chief Executive Officer (CEO) receives a suspicious voic...
Question 215: A security administrator is tackling issues related to authe...
Question 216: A programmer must write a piece of code to encrypt passwords...
Question 217: Which of the following documents outlines the responsibility...
Question 218: An advantage of virtualizing servers, databases, and office ...
Question 219: A recent audit has discovered that at the time of password e...
Question 220: A company wants to ensure that its hot site is prepared and ...
Question 221: A network administrator has recently updated their network d...
Question 222: One month after a software developer was terminated, the hel...
Question 223: A system administrator is configuring a new file server and ...
Question 224: Pete, the system administrator, is reviewing his disaster re...
Question 225: An internal auditing team would like to strengthen the passw...
Question 226: Which of the following is true about input validation in a c...
Question 227: Joe, an end user, has received a virus detection warning. Wh...
Question 228: Using a protocol analyzer, a security consultant was able to...
Question 229: Which of the following assessment techniques would a securit...
Question 230: Which of the following is considered a risk management BEST ...
Question 231: A security administrator discovered that all communication o...
Question 232: Which of the following uses both a public and private key?...
Question 233: A company has purchased an application that integrates into ...
Question 234: A company executive's laptop was compromised, leading to a s...
Question 235: Joe, the information security manager, is tasked with calcul...
Question 236: Which of the following is public keys used for?...
Question 237: An administrator is configuring a network for all users in a...
Question 238: During a recent audit, the auditors cited the company's curr...
Question 239: Which of the following application attacks is used against a...
Question 240: Which of the following would provide the STRONGEST encryptio...
Question 241: A switch is set up to allow only 2 simultaneous MAC addresse...
Question 242: The ore-sales engineering team needs to quickly provide accu...
Question 243: DRAG DROP Determine the types of attacks below by selecting ...
Question 244: Matt, an administrator, is concerned about the wireless netw...
Question 245: An administrator receives a security alert that appears to b...
Question 246: An administrator is having difficulty configuring WPA2 Enter...
Question 247: Matt, a security administrator, wants to ensure that the mes...
Question 248: Which of the following should a security technician implemen...
Question 249: Maintenance workers find an active network switch hidden abo...
Question 250: A Company has recently identified critical systems that supp...
Question 251: Which of the following best describes the reason for using h...
Question 252: Joe, a network administrator, is able to manage the backup s...
Question 253: A network administrator, Joe, arrives at his new job to find...
Question 254: All of the following are valid cryptographic hash functions ...
Question 255: The database server used by the payroll system crashed at 3 ...
Question 256: An IT security technician needs to establish host based secu...
Question 257: Which of the following wireless protocols could be vulnerabl...
Question 258: A user attempts to install new and relatively unknown softwa...
Question 259: Which of the following provides a static record of all certi...
Question 260: A network administrator is configuring access control for th...
Question 261: A security administrator must implement a secure key exchang...
Question 262: A server crashes at 6 pm. Senior management has determined t...
Question 263: A BYOD policy in which employees are able to access the wire...
Question 264: While an Internet café a malicious user is causing all surro...
Question 265: Which of the following incident response plan steps would MO...
Question 266: Which of the following attacks would cause all mobile device...
Question 267: A webpage displays a potentially offensive advertisement on ...
Question 268: A security technician received notification of a remotely ex...
Question 269: HOTSPOT Select the appropriate attack from each drop down li...
Question 270: A security administrator is auditing a database server to en...
Question 271: A technician reports a suspicious individual is seen walking...
Question 272: Which of the following utilities can be used in Linux to vie...
Question 273: During a routine configuration audit, a systems administrato...
Question 274: Highly sensitive data is stored in a database and is accesse...
Question 275: A company is rolling out a new e-commerce website. The secur...
Question 276: Which of the following will help prevent smurf attacks?...
Question 277: Joe, the system administrator, has been asked to calculate t...
Question 278: Encryption used by RADIUS is BEST described as:...
Question 279: Joe a company's new security specialist is assigned a role t...
Question 280: Which of the following is true about an email that was signe...
Question 281: Jane, an IT security technician, needs to create a way to se...
Question 282: Which of the following types of attacks involves interceptio...
Question 283: An online store wants to protect user credentials and credit...
Question 284: Joe has hired several new security administrators and have b...
Question 285: A security administrator is reviewing the company's continui...
Question 286: A company's application is hosted at a data center. The data...
Question 287: The chief security officer (CSO) has reported a rise in data...
Question 288: A network administrator recently updated various network dev...
Question 289: Digital signatures are used for ensuring which of the follow...
Question 290: The finance department just procured a software application ...
Question 291: A user commuting to work via public transport received an of...
Question 292: A company has 5 users. Users 1, 2 and 3 need access to payro...
Question 293: A security Operations Center was scanning a subnet for infec...
Question 294: A malicious user has collected the following list of informa...
Question 295: Which of the following provides data the best fault toleranc...
Question 296: A security analyst must ensure that the company's web server...
Question 297: Which of the following protocols encapsulates an IP packet w...
Question 298: RC4 is a strong encryption protocol that is generally used w...
Question 299: A server with the IP address of 10.10.2.4 has been having in...
Question 300: A company requires that all wireless communication be compli...
Question 301: A server administrator discovers the web farm is using weak ...
Question 302: Which of the following disaster recovery strategies has the ...
Question 303: Which of the following practices reduces the management burd...
Question 304: After analyzing and correlating activity from multiple senso...
Question 305: Which of the following authentication methods can use the SC...
Question 306: Which of the following is the BEST reason for placing a pass...
Question 307: An employee in the accounting department recently received a...
Question 308: During an audit, the security administrator discovers that t...
Question 309: A security administrator needs a locally stored record to re...
Question 310: Which of the following application security testing techniqu...
Question 311: Which of the following techniques can be used to prevent the...
Question 312: When confidentiality is the primary concern, and a secure ch...
Question 313: Users can authenticate to a company's web applications using...
Question 314: Joe, the chief technical officer (CTO) is concerned that the...
Question 315: Which of the following is the below pseudo-code an example o...
Question 316: A security administrator wants to deploy security controls t...
Question 317: Which of the following wireless security measures can an att...
Question 318: A security director has contracted an outside testing compan...
Question 319: Which of the following is considered an environmental contro...
Question 320: Which of the following is an example of establishing a publi...
Question 321: Which of the following will allow the live state of the virt...
Question 322: Which of the following is used to certify intermediate autho...
Question 323: Which of the following design components is used to isolate ...
Question 324: Which of the following concepts describes the use of a one-w...
Question 325: Log file analysis on a router reveals several unsuccessful t...
Question 326: Four weeks ago, a network administrator applied a new IDS an...
Question 327: During an anonymous penetration test, Jane, a system adminis...
Question 328: An administrator has to determine host operating systems on ...
Question 329: Sara, a security administrator, is noticing a slowdown in th...
Question 330: Which of the following best describes the objectives of succ...
Question 331: The security administrator receives a service ticket saying ...
Question 332: An administrator has advised against the use of Bluetooth ph...
Question 333: Which of the following types of attacks is based on coordina...
Question 334: A Chief Privacy Officer, Joe, is concerned that employees ar...
Question 335: Which of the following ciphers would be BEST used to encrypt...
Question 336: Company A submitted a bid on a contract to do work for Compa...
Question 337: Ann, a security administrator at a call center, has been exp...
Question 338: A security technician is attempting to access a wireless net...
Question 339: The recovery agent is used to recover the:...
Question 340: A security administrator would like the corporate webserver ...
Question 341: Which of the following BEST describes a SQL Injection attack...
Question 342: After connecting to the corporate network a user types the U...
Question 343: A system administrator is configuring shared secrets on serv...
Question 344: A network administrator has purchased two devices that will ...
Question 345: A one-time security audit revealed that employees do not hav...
Question 346: A company hosts a web server that requires entropy in encryp...
Question 347: Which of the following technologies when applied to android ...
Question 348: Company policy requires employees to change their passwords ...
Question 349: Which of the following provides the strongest authentication...
Question 350: The system administrator is reviewing the following logs fro...
Question 351: Users need to exchange a shared secret to begin communicatin...
Question 352: When designing a corporate NAC solution, which of the follow...
Question 353: The internal audit group discovered that unauthorized users ...
Question 354: Sara, a security architect, has developed a framework in whi...
Question 355: Which of the following password attacks involves attempting ...
Question 356: A user, Ann, is reporting to the company IT support group th...
Question 357: The security administrator is analyzing a user's history fil...
Question 358: A software developer wants to prevent stored passwords from ...
Question 359: During a company-wide initiative to harden network security,...
Question 360: A company would like to take electronic orders from a partne...
Question 361: Which of the following can only be mitigated through the use...
Question 362: An administrator was asked to review user accounts. Which of...
Question 363: A system security analyst using an enterprise monitoring too...
Question 364: A recent review of accounts on various systems has found tha...
Question 365: After a user performed a war driving attack, the network adm...
Question 366: The security manager wants to unify the storage of credentia...
Question 367: A malicious individual used an unattended customer service k...
Question 368: Ann, the software security engineer, works for a major softw...
Question 369: A project team is developing requirements of the new version...
Question 370: Which of the following may be used with a BNC connector?...
Question 371: Ann, a security administrator, is strengthening the security...
Question 372: A system administrator has been instructed by the head of se...
Question 373: Which of the following malware types is MOST likely to execu...
Question 374: Which of the following is used to verify data integrity?...
Question 375: Which of the following is where an unauthorized device is fo...
Question 376: After a production outage, which of the following documents ...
Question 377: A database administrator receives a call on an outside telep...
Question 378: A security administrator must implement all requirements in ...
Question 379: A bank has recently deployed mobile tablets to all loan offi...
Question 380: Which of the following can be performed when an element of t...
Question 381: While preparing for an audit a security analyst is reviewing...
Question 382: Which of the following authentication provides users XML for...
Question 383: Which of the following protocols is vulnerable to man-in-the...
Question 384: Joe is the accounts payable agent for ABC Company. Joe has b...
Question 385: An administrator has two servers and wants them to communica...
Question 386: A risk assessment team is concerned about hosting data with ...
Question 387: Which of the following provides additional encryption streng...
Question 388: Which of the following may significantly reduce data loss if...
Question 389: A system administrator is conducting baseline audit and dete...
Question 390: While opening an email attachment, Pete, a customer, receive...
Question 391: Sara, a user, downloads a keygen to install pirated software...
Question 392: The IT department noticed that there was a significant decre...
Question 393: Upper management decides which risk to mitigate based on cos...
Question 394: When reviewing a digital certificate for accuracy, which of ...
Question 395: An attacker is attempting to insert malicious code into an i...
Question 396: Joe, a company's network engineer, is concerned that protoco...
Question 397: Which of the following protocols provides transport security...
Question 398: A company has two server administrators that work overnight ...
Question 399: Which of the following, if properly implemented, would preve...
Question 400: In performing an authorized penetration test of an organizat...
Question 401: Which of the following BEST describes the type of attack tha...
Question 402: Protecting the confidentiality of a message is accomplished ...
Question 403: Which of the following tools will allow a technician to dete...
Question 404: Purchasing receives a phone call from a vendor asking for a ...
Question 405: Which of the following can be used by a security administrat...
Question 406: During a security assessment, an administrator wishes to see...
Question 407: A security administrator is aware that a portion of the comp...
Question 408: Which of the following types of cryptography should be used ...
Question 409: Which of the following file systems is from Microsoft and wa...
Question 410: An administrator has successfully implemented SSL on srv4.co...
Question 411: Users in the HR department were recently informed that they ...
Question 412: Which of the following passwords is the LEAST complex?...
Question 413: Which of the following controls can be implemented together ...
Question 414: A user, Ann, has been issued a smart card and is having prob...
Question 415: The IT department has installed new wireless access points b...
Question 416: At the outside break area, an employee, Ann, asked another e...
Question 417: Deploying a wildcard certificate is one strategy to:...
Question 418: A password audit has revealed that a significant percentage ...
Question 419: RC4 is a strong encryption protocol that is general used wit...
Question 420: Which of the following is the best practice for error and ex...
Question 421: In order to maintain oversight of a third party service prov...
Question 422: Various employees have lost valuable customer data due to ha...
Question 423: Ann, a software developer, has installed some code to reacti...
Question 424: Use of group accounts should be minimized to ensure the foll...
Question 425: A computer supply company is located in a building with thre...
Question 426: Sara, a security analyst, is trying to prove to management w...
Question 427: When employees that use certificates leave the company they ...
Question 428: Which of the following provides the BEST application availab...
Question 429: Joe, the system administrator, is setting up a wireless netw...
Question 430: An administrator notices an unusual spike in network traffic...
Question 431: A bank is planning to implement a third factor to protect cu...
Question 432: Which of the following cryptographic algorithms is MOST ofte...
Question 433: A system administrator has noticed vulnerability on a high i...
Question 434: A security engineer is tasked with encrypting corporate emai...
Question 435: An organization has an internal PKI that utilizes client cer...
Question 436: The security manager reports that the process of revoking ce...
Question 437: Which of the following pseudocodes can be used to handle pro...
Question 438: Which of the following is BEST utilized to identify common m...
Question 439: A network engineer is configuring a VPN tunnel connecting a ...
Question 440: Based on information leaked to industry websites, business m...
Question 441: One of the most consistently reported software security vuln...
Question 442: Ann is starting a disaster recovery program. She has gathere...
Question 443: After running into the data center with a vehicle, attackers...
Question 444: Which of the following was launched against a company based ...
Question 445: ABC company has a lot of contractors working for them. The p...
Question 446: Ann, a security analyst, has discovered that her company has...
Question 447: Which of the following is the GREATEST security concern of a...
Question 448: Which of the following explains the difference between a pub...
Question 449: Jane has recently implemented a new network design at her or...
Question 450: Which of the following implementation steps would be appropr...
Question 451: A company wants to prevent unauthorized access to its secure...
Question 452: Which of the following can BEST help prevent cross-site scri...
Question 453: Which of the following describes the process of removing unn...
Question 454: An administrator is investigating a system that may potentia...
Question 455: One of the senior managers at a company called the help desk...
Question 456: A hacker has discovered a simple way to disrupt business for...
Question 457: A security administrator wishes to prevent certain company d...
Question 458: A user has unknowingly gone to a fraudulent site. The securi...
Question 459: A program has been discovered that infects a critical Window...
Question 460: The Quality Assurance team is testing a third party applicat...
Question 461: A security audit identifies a number of large email messages...
Question 462: Which of the following is the practice of marking open wirel...
Question 463: Although a vulnerability scan report shows no vulnerabilitie...
Question 464: Which of the following is the best practice to put at the en...
Question 465: Which of the following authentication services combines auth...
Question 466: A security analyst has a sample of malicious software and ne...
Question 467: A system administrator has concerns regarding their users ac...
Question 468: Due to hardware limitation, a technician must implement a wi...
Question 469: A technician is configuring a switch to support VOPIP phones...
Question 470: A security administrator needs to implement a technology tha...
Question 471: Which of the following must be kept secret for a public key ...
Question 472: Which of the following describes purposefully injecting extr...
Question 473: After copying a sensitive document from his desktop to a fla...
Question 474: A network security engineer notices unusual traffic on the n...
Question 475: A recent online password audit has identified that stale acc...
Question 476: In an environment where availability is critical such as Ind...
Question 477: Which of the following devices is BEST suited for servers th...
Question 478: Public key certificates and keys that are compromised or wer...
Question 479: Which of the following is characterized by an attacker attem...
Question 480: Which of the following should an administrator implement to ...
Question 481: Which of the following types of trust models is used by a PK...
Question 482: The IT department has setup a website with a series of quest...
Question 483: Which of the following is characterized by an attack against...
Question 484: A security administrator suspects that an employee in the IT...
Question 485: A user attempting to log on to a workstation for the first t...
Question 486: An organization currently uses FTP for the transfer of large...
Question 487: Users at a company report that a popular news website keeps ...
Question 488: Ann is traveling for business and is attempting to use the h...
Question 489: A security administrator is concerned about the strength of ...
Question 490: How often, at a MINIMUM, should Sara, an administrator, revi...
Question 491: A company has recently begun to provide internal security aw...
Question 492: Which of the following will allow Pete, a security analyst, ...
Question 493: Which of the following would a security administrator implem...
Question 494: Which of the following is a penetration testing method?...
Question 495: A bank Chief Information Security Officer (CISO) is responsi...
Question 496: Which of the following types of technologies is used by secu...
Question 497: Without validating user input, an application becomes vulner...
Question 498: A company needs to provide a secure backup mechanism for key...
Question 499: After Matt, a user, enters his username and password at the ...
Question 500: A company's Chief Information Officer realizes the company c...
Question 501: The marketing department wants to distribute pens with embed...
Question 502: A security administrator at a company which implements key e...
Question 503: Ann, a newly hired human resource employee, sent out confide...
Question 504: Human Resources suspects an employee is accessing the employ...
Question 505: A security administrator notices large amounts of traffic wi...
Question 506: A server administrator notes that a fully patched applicatio...
Question 507: Joe, an employee, was escorted from the company premises due...
Question 508: A company has identified a watering hole attack. Which of th...
Question 509: Which of the following can be implemented with multiple bit ...
Question 510: Which of the following metrics is important for measuring th...
Question 511: A new security analyst is given the task of determining whet...
Question 512: Which of the following BEST describes a protective counterme...
Question 513: Several users' computers are no longer responding normally a...
Question 514: Vendors typically ship software applications with security s...
Question 515: If Organization A trusts Organization B and Organization B t...
Question 516: Users are utilizing thumb drives to connect to USB ports on ...
Question 517: A security administrator must implement a system to allow cl...
Question 518: A network administrator was to implement a solution that wil...
Question 519: One of the findings of risk assessment is that many of the s...
Question 520: Which of the following means a password history value of thr...
Question 521: An administrator has concerns regarding the company's server...
Question 522: The BEST methods for a web developer to prevent the website ...
Question 523: Which of the following symmetric key algorithms are examples...
Question 524: The security administrator is implementing a malware storage...
Question 525: Users report that after downloading several applications, th...
Question 526: A small company has a website that provides online customer ...
Question 527: A risk management team indicated an elevated level of risk d...
Question 528: A small company has recently purchased cell phones for manag...
Question 529: An administrator implements SELinux on a production web serv...
Question 530: A company uses PGP to ensure that sensitive email is protect...
Question 531: The access control list (ACL) for a file on a server is as f...
Question 532: HOTSPOT For each of the given items, select the appropriate ...
Question 533: Which of the following controls can be used to prevent the d...
Question 534: Which of the following forms of software testing can best be...
Question 535: Which of the following identifies certificates that have bee...
Question 536: Which of the following risk concepts requires an organizatio...
Question 537: A security analyst has been notified that trade secrets are ...
Question 538: During a server audit, a security administrator does not not...
Question 539: Company A and Company B both supply contractual services to ...
Question 540: Which of the following steps of incident response does a tea...
Question 541: Which of the following is an example of a false positive?...
Question 542: The system administrator notices that many employees are usi...
Question 543: Which of the following offers the LEAST secure encryption ca...
Question 544: Ann a security technician receives a report from a user that...
Question 545: A chief information officer (CIO) is concerned about PII con...
Question 546: Which of the following is true about PKI? (Choose two.)...
Question 547: The key management organization has implemented a key escrow...
Question 548: A company's chief information officer (CIO) has analyzed the...
Question 549: A classroom utilizes workstations running virtualization sof...
Question 550: An application developer needs to allow employees to use the...
Question 551: Several employee accounts appear to have been cracked by an ...
Question 552: Two organizations want to share sensitive data with one anot...
Question 553: A small business needs to incorporate fault tolerance into t...
Question 554: During a penetration test from the Internet, Jane, the syste...
Question 555: An administrator needs to submit a new CSR to a CA. Which of...
Question 556: Which of the following is an important implementation consid...
Question 557: Pete, the security administrator, has been notified by the I...
Question 558: Sara, a hacker, is completing a website form to request a fr...
Question 559: To ensure compatibility with their flagship product, the sec...
Question 560: The security consultant is assigned to test a client's new s...
Question 561: The chief Risk officer is concerned about the new employee B...
Question 562: A computer is found to be infected with malware and a techni...
Question 563: A recent spike in virus detections has been attributed to en...
Question 564: A user was reissued a smart card after the previous smart ca...
Question 565: A company would like to implement two-factor authentication ...
Question 566: Which of the following is a black box testing methodology?...
Question 567: Which of the following is true about asymmetric encryption?...
Question 568: Which of the following BEST describes malware that tracks a ...
Question 569: Which of the following provides Digital Signatures?...
Question 570: A company is deploying a new video conferencing system to be...
Question 571: An administrator deploys a WPA2 Enterprise wireless network ...
Question 572: Pete, the security engineer, would like to prevent wireless ...
Question 573: Sara, the Chief Information Officer (CIO), has requested an ...
Question 574: An administrator performs a risk calculation to determine if...
Question 575: Joe, an employee is taking a taxi through a busy city and st...
Question 576: A company has just deployed a centralized event log storage ...
Question 577: The chief security officer (CSO) has issued a new policy to ...
Question 578: Which of the following concepts is enforced by certifying th...
Question 579: A security manager installed a standalone fingerprint reader...
Question 580: A network inventory discovery application requires non-privi...
Question 581: A CRL is comprised of.
Question 582: A Company transfers millions of files a day between their se...
Question 583: A security administrator wants to test the reliability of an...
Question 584: Which of the following BEST allows Pete, a security administ...
Question 585: A company wishes to prevent unauthorized employee access to ...
Question 586: Which of the following is it MOST difficult to harden agains...
Question 587: Fuzzing is a security assessment technique that allows teste...
Question 588: Which of the following is a measure of biometrics performanc...
Question 589: Which of the following attacks could be used to initiate a s...
Question 590: The sales force in an organization frequently travel to remo...
Question 591: A user attempts to install a new and relatively unknown soft...
Question 592: A recent audit of a company's identity management system sho...
Question 593: An email client says a digital signature is invalid and the ...
Question 594: The Chief Executive Officer (CEO) Joe notices an increase in...
Question 595: A security administrator is designing an access control syst...
Question 596: A supervisor in the human resources department has been give...
Question 597: The string: ' or 1=1-- - Which of the following represents i...
Question 598: Which of the following concepts is used by digital signature...
Question 599: Matt, a developer, recently attended a workshop on a new app...
Question 600: Matt, a forensic analyst, wants to obtain the digital finger...
Question 601: A new intern was assigned to the system engineering departme...
Question 602: A software development company has hired a programmer to dev...
Question 603: A certificate used on an e-commerce web server is about to e...
Question 604: Which of the following can be used to ensure that sensitive ...
Question 605: Joe, a network administrator, is setting up a virtualization...
Question 606: An administrator notices that former temporary employees' ac...
Question 607: Which of the following provides the LEAST availability?...
Question 608: In order to enter a high-security data center, users are req...
Question 609: An attacker impersonates a fire marshal and demands access t...
Question 610: A security administrator has just finished creating a hot si...
Question 611: Users are trying to communicate with a network but are unabl...
Question 612: An IT auditor tests an application as an authenticated user....
Question 613: A company is starting to allow employees to use their own pe...
Question 614: Which of the following access methods uses radio frequency w...
Question 615: Which of the following is the MOST specific plan for various...
Question 616: A resent OS patch caused an extended outage. It took the IT ...
Question 617: A file on a Linux server has default permissions of rw-rw-r-...
Question 618: A vulnerability assessment indicates that a router can be ac...
Question 619: Pete, an employee, is terminated from the company and the le...
Question 620: Which of the following would BEST be used to calculate the e...
Question 621: In order to gain an understanding of the latest attack tools...
Question 622: Which of the following describes the implementation of PAT?...
Question 623: Which of the following would BEST deter an attacker trying t...
Question 624: A corporation has experienced several media leaks of proprie...
Question 625: A technician has been assigned a service request to investig...
Question 626: Sara, a security administrator, manually hashes all network ...
Question 627: An administrator finds that non-production servers are being...
Question 628: Physical documents must be incinerated after a set retention...
Question 629: A security administrator would like to ensure that system ad...
Question 630: A company is concerned that a compromised certificate may re...
Question 631: Which of the following tasks should key elements of a busine...
Question 632: All executive officers have changed their monitor location s...
Question 633: Which of the following would Jane, an administrator, use to ...
Question 634: A company recently received accreditation for a secure netwo...
Question 635: Which of the following MUST be updated immediately when an e...
Question 636: Which of the following is BEST used to capture and analyze n...
Question 637: Joe, the system administrator, is performing an overnight sy...
Question 638: Which of the following application security principles invol...
Question 639: Ann is the data owner of financial records for a company. Sh...
Question 640: A security technician is concerned there4 is not enough secu...
Question 641: Matt, an IT administrator, wants to protect a newly built se...
Question 642: A load balancer has the ability to remember which server a p...
Question 643: A rogue programmer included a piece of code in an applicatio...
Question 644: The security administrator notices a user logging into a cor...
Question 645: Which of the following techniques enables a highly secured o...
Question 646: Using proximity card readers instead of the traditional key ...
Question 647: A way to assure data at-rest is secure even in the event of ...
Question 648: A company hires a penetration testing team to test its overa...
Question 649: The Chief Information Officer (CIO) wants to implement a red...
Question 650: An administrator, Ann, wants to ensure that only authorized ...
Question 651: A programmer has allocated a 32-bit variable to store the re...
Question 652: Which of the following attacks impact the availability of a ...
Question 653: Which of the following can Pete, a security administrator, u...
Question 654: Pete, the Chief Executive Officer (CEO) of a company, has in...
Question 655: It is important to staff who use email messaging to provide ...
Question 656: A new MPLS network link has been established between a compa...
Question 657: Which of the following provides the HIGHEST level of confide...
Question 658: An attacker unplugs the access point at a coffee shop. The a...
Question 659: A network administrator argues that WPA2 encryption is not n...
Question 660: A program displays: ERROR: this program has caught an except...
Question 661: Which of the following exploits either a host file on a targ...
Question 662: Ann has recently transferred from the payroll department to ...
Question 663: During a routine audit it is discovered that someone has bee...
Question 664: Which of the following is a software vulnerability that can ...
Question 665: Sara, an application developer, implemented error and except...
Question 666: Which of the following is the MOST likely cause of users bei...
Question 667: A video surveillance audit recently uncovered that an employ...
Question 668: Pete, the system administrator, has concerns regarding users...
Question 669: Which of the following can Joe, a security administrator, im...
Question 670: Which of the following application attacks is used to gain a...
Question 671: Which of the following attacks allows access to contact list...
Question 672: A business has recently adopted a policy allowing employees ...
Question 673: Which of the following is described as an attack against an ...
Question 674: Which of the following will provide data encryption, key man...
Question 675: An employee's mobile device associates with the company's gu...
Question 676: Which of the following controls mitigates the risk of Matt, ...
Question 677: The Chief Security Officer (CSO) for a datacenter in a hosti...
Question 678: A security administrator has been tasked with assisting in t...
Question 679: Ann, the network administrator, has learned from the helpdes...
Question 680: Joe, an application developer, is building an external facin...
Question 681: Ann, the Chief Technology Officer (CTO), has agreed to allow...
Question 682: Several users report to the administrator that they are havi...
Question 683: The IT department has been tasked with reducing the risk of ...
Question 684: Joe, a web developer, wants to make sure his application is ...
Question 685: Ann wants to send a file to Joe using PKI. Which of the foll...
Question 686: An organization processes credit card transactions and is co...
Question 687: A technician wants to secure communication to the corporate ...
Question 688: A security engineer is asked by the company's development te...
Question 689: A web administrator has just implemented a new web server to...
Question 690: Which of the following concepts allows an organization to gr...
Question 691: A company has recently allowed employees to take advantage o...
Question 692: Data execution prevention is a feature in most operating sys...
Question 693: Which of the following represents a cryptographic solution w...
Question 694: An administrator is instructed to disable IP-directed broadc...
Question 695: A system administrator has noticed network performance issue...
Question 696: A technician has deployed a new VPN concentrator. The device...
Question 697: Which of the following types of application attacks would be...
Question 698: A security administrator is reviewing the below output from ...
Question 699: Which of the following BEST describes disk striping with par...
Question 700: A security analyst implemented group-based privileges within...
Question 701: Which of the following can be used to ensure digital certifi...
Question 702: A network technician has received comments from several user...
Question 703: Which of the following is true about the recovery agent?...
Question 704: An IT security technician is actively involved in identifyin...
Question 705: A system administrator needs to ensure that certain departme...
Question 706: After encrypting all laptop hard drives, an executive office...
Question 707: In order to use a two-way trust model the security administr...
Question 708: Users are encouraged to click on a link in an email to obtai...
Question 709: Which of the following would a security administrator implem...
Question 710: Pete, a security analyst, has been tasked with explaining th...
Question 711: A large multinational corporation with networks in 30 countr...
Question 712: An administrator is concerned that a company's web server ha...
Question 713: A new security policy being implemented requires all email w...
Question 714: Which of the following risks could IT management be mitigati...
Question 715: Which of the following would an attacker use to generate and...
Question 716: A security administrator wants to get a real time look at wh...
Question 717: Which of the following would be used as a secure substitute ...
Question 718: A bank has a fleet of aging payment terminals used by mercha...
Question 719: A small IT security form has an internal network composed of...
Question 720: A security administrator is notified that users attached to ...
Question 721: The Chief Information Officer (CIO) has asked a security ana...
Question 722: Attempting to inject 50 alphanumeric key strokes including s...
Question 723: Joe, a user, in a coffee shop is checking his email over a w...
Question 724: An administrator uses a server with a trusted OS and is conf...
Question 725: A security administrator forgets their card to access the se...
Question 726: When creating a public / private key pair, for which of the ...
Question 727: A security administrator wants to check user password comple...
Question 728: Which of the following security concepts identifies input va...
Question 729: Which of the following malware types typically allows an att...
Question 730: Mobile tablets are used by employees on the sales floor to a...
Question 731: A security engineer would like to analyze the effect of depl...
Question 732: One of the servers on the network stops responding due to la...
Question 733: Which of the following is used by the recipient of a digital...
Question 734: During a disaster recovery planning session, a security admi...
Question 735: Which of the following should be used to authenticate and lo...
Question 736: Joe, a user, wants to send an encrypted email to Ann. Which ...
Question 737: The public key is used to perform the following: (Choose thr...
Question 738: Joe must send Ann a message and provide Ann with assurance t...
Question 739: A network administrator noticed various chain messages have ...
Question 740: A network administrator has identified port 21 being open an...
Question 741: Which of the following authentication protocols makes use of...
Question 742: Which of the following is BEST utilized to actively test sec...
Question 743: An outside security consultant produces a report of several ...
Question 744: A security manager requires fencing around the perimeter, an...
Question 745: Which of the following is the BEST concept to maintain requi...
Question 746: Customers' credit card information was stolen from a popular...
Question 747: An auditing team has found that passwords do not meet the be...
Question 748: A security administrator has concerns that employees are ins...
Question 749: A network analyst received a number of reports that imperson...
Question 750: A company replaces a number of devices with a mobile applian...
Question 751: A datacenter has suffered repeated burglaries which led to e...
Question 752: Purchasing receives an automated phone call from a bank aski...
Question 753: Which of the following is the BEST technology for the sender...
Question 754: Which of the following cryptographic methods is most secure ...
Question 755: A security analyst discovered data such as images and word d...
Question 756: After recovering from a data breach in which customer data w...
Question 757: On a train, an individual is watching a proprietary video on...
Question 758: A security administrator must implement a network that is im...
Question 759: Which of the following are unique to white box testing metho...
Question 760: Which of the following types of cloud computing would be MOS...
Question 761: Suspicious traffic without a specific signature was detected...
Question 762: If an organization wants to implement a BYOD policy, which o...
Question 763: A security technician at a small business is worried about t...
Question 764: In which of the following scenarios is PKI LEAST hardened?...
Question 765: A computer security officer has investigated a possible data...
Question 766: Which of the following BEST represents the goal of a vulnera...
Question 767: A new network administrator is setting up a new file server ...
Question 768: Matt, the Chief Information Security Officer (CISO), tells t...
Question 769: Account lockout is a mitigation strategy used by Jane, the a...
Question 770: Which of the following could cause a browser to display the ...
Question 771: A user has called the help desk to report an enterprise mobi...
Question 772: Which of the following allows lower level domains to access ...
Question 773: After visiting a website, a user receives an email thanking ...
Question 774: When using PGP, which of the following should the end user p...
Question 775: A network administrator is looking for a way to automaticall...
Question 776: Which of the following concepts defines the requirement for ...
Question 777: Company XYZ has encountered an increased amount of buffer ov...
Question 778: A company used a partner company to develop critical compone...
Question 779: Which of the following network devices is used to analyze tr...
Question 780: The help desk is experiencing a higher than normal amount of...
Question 781: The Quality Assurance team is testing a new third party deve...
Question 782: Which of the following transportation encryption protocols s...
Question 783: Which of the following cryptographic related browser setting...
Question 784: Which of the following is an application security coding pro...
Question 785: Using a heuristic system to detect an anomaly in a computer'...
Question 786: A company hosts its public websites internally. The administ...
Question 787: Which of the following security architecture elements also h...
Question 788: An agent wants to create fast and efficient cryptographic ke...
Question 789: An attacker attempted to compromise a web form by inserting ...
Question 790: An attacker has gained access to the company's web server by...
Question 791: What is a system that is intended or designed to be broken i...
Question 792: Jane, a security administrator, has observed repeated attemp...
Question 793: Which of the following allows a network administrator to imp...
Question 794: A large bank has moved back office operations offshore to an...
Question 795: Which of the following is a concern when encrypting wireless...
Question 796: Which of the following actions in PKI takes a certificate au...
Question 797: A small company wants to employ PKI. The company wants a cos...
Question 798: A company has been attacked and their website has been alter...
Question 799: Which of the following types of wireless attacks would be us...
Question 800: Which of the following should Matt, a security administrator...
Question 801: Which of the following may cause Jane, the security administ...
Question 802: Which of the following components MUST be trusted by all par...
Question 803: In order to secure additional budget, a security manager wan...
Question 804: A recently installed application update caused a vital appli...
Question 805: An internal audit has detected that a number of archived tap...
Question 806: Joe, the security administrator, has determined that one of ...
Question 807: The concept of rendering data passing between two points ove...
Question 808: The software developer is responsible for writing the code a...
Question 809: Employees are reporting that they have been receiving a larg...
Question 810: Which of the following would prevent a user from installing ...
Question 811: During a routine audit a web server is flagged for allowing ...
Question 812: SIMULATION A security administrator discovers that an attack...
Question 813: A system security analyst wants to capture data flowing in a...
Question 814: An attacker Joe configures his service identifier to be as a...
Question 815: A security analyst, Ann, is reviewing an IRC channel and not...
Question 816: Which of the following can take advantage of man-in-the-midd...
Question 817: Users have been reporting that their wireless access point i...
Question 818: A process in which the functionality of an application is te...
Question 819: An attacker went to a local bank and collected disposed pape...
Question 820: Which of the following is an indication of an ongoing curren...
Question 821: An administrator needs to renew a certificate for a web serv...
Question 822: An employee reports work was being completed on a company ow...
Question 823: In order for network monitoring to work properly, you need a...
Question 824: Which of the following can use RC4 for encryption? (Choose t...
Question 825: Identifying residual is MOST important to which of the follo...
Question 826: Ann a new small business owner decides to implement WiFi acc...
Question 827: A system administrator is setting up a file transfer server....
Question 828: Which of the following should be used when a business needs ...
Question 829: After an assessment, auditors recommended that an applicatio...
Question 830: Which of the following protocols is the security administrat...
Question 831: Which of the following technologies was developed to allow c...
Question 832: A systems administrator has implemented PKI on a classified ...
Question 833: A new web server has been provisioned at a third party hosti...
Question 834: The main corporate website has a service level agreement tha...
Question 835: Joe, a user, wants to send an encrypted email to Ann. Which ...
Question 836: Two programmers write a new secure application for the human...
Question 837: A company requires that all users enroll in the corporate PK...
Question 838: Corporate IM presents multiple concerns to enterprise IT. Wh...
Question 839: An SSL session is taking place. After the handshake phase ha...
Question 840: A security administrator is using a software program to test...
Question 841: A security administrator needs to determine which system a p...
Question 842: The security administrator installed a newly generated SSL c...
Question 843: When Ann an employee returns to work and logs into her works...
Question 844: The system administrator is tasked with changing the adminis...
Question 845: A company has several public conference room areas with expo...
Question 846: A security administrator wants to deploy a physical security...
Question 847: In regard to secure coding practices, why is input validatio...
Question 848: An administrator has a network subnet dedicated to a group o...
Question 849: Which of the following is the MOST intrusive type of testing...
Question 850: After receiving the hard drive from detectives, the forensic...
Question 851: A security administrator is investigating a recent server br...
Question 852: A company is looking to improve their security posture by ad...
Question 853: In an effort to test the effectiveness of an organization's ...
Question 854: Ann, the security administrator, received a report from the ...
Question 855: An investigator recently discovered that an attacker placed ...
Question 856: Users in an organization are experiencing when attempting to...
Question 857: A corporate wireless guest network uses an open SSID with a ...
Question 858: An insurance company requires an account recovery process so...
Question 859: An organizations' security policy requires that users change...
Question 860: Which of the following can a security administrator implemen...
Question 861: The Chief Information Officer (CIO) receives an anonymous th...
Question 862: The system administrator has been notified that many users a...
Question 863: Ann was reviewing her company's event logs and observed seve...
Question 864: A new client application developer wants to ensure that the ...
Question 865: An organization's security policy states that users must aut...
Question 866: Several employees clicked on a link in a malicious message t...
Question 867: A victim is logged onto a popular home router forum site in ...
Question 868: A security technician has been asked to recommend an authent...
Question 869: Which of the following would be used to allow a subset of tr...
Question 870: A thief has stolen mobile device and removed its battery to ...
Question 871: Which of the following can be implemented if a security admi...
Question 872: Which of the following must a user implement if they want to...
Question 873: A system administrator wants to use open source software but...
Question 874: Joe needs to track employees who log into a confidential dat...
Question 875: A user Ann has her assigned token but she forgotten her pass...
Question 876: Which of the following are restricted to 64-bit block sizes?...
Question 877: After a security incident involving a physical asset, which ...
Question 878: Which of the following would a security administrator implem...
Question 879: Company employees are required to have workstation client ce...
Question 880: Which of the following types of malware, attempts to circumv...
Question 881: Sara, an attacker, is recording a person typing in their ID ...
Question 882: An organization must implement controls to protect the confi...
Question 883: A company wants to improve its overall security posture by d...
Question 884: Which of the following are examples of detective controls?...
Question 885: Which of the following would be used to identify the securit...
Question 886: A company wants to ensure that all credentials for various s...
Question 887: The call center supervisor has reported that many employees ...
Question 888: A network administrator identifies sensitive files being tra...
Question 889: Several departments within a company have a business need to...
Question 890: An Information Systems Security Officer (ISSO) has been plac...
Question 891: Allowing unauthorized removable devices to connect to comput...
Question 892: A cafe provides laptops for Internet access to their custome...
Question 893: Client computers login at specified times to check and updat...
Question 894: Joe, a user, reports to the system administrator that he is ...
Question 895: A CA is compromised and attacks start distributing malicious...
Question 896: Joe analyzed the following log and determined the security t...
Question 897: Ann a new security specialist is attempting to access the in...
Question 898: A security administrator discovers an image file that has se...
Question 899: A university has a building that holds the power generators ...
Question 900: A server administrator notes that a legacy application often...