Which of the following would BEST meet me requirement for the other factor?
An organization requires two separate factors as part of an authentication scheme. One of those factors is a password. Which of the following would BEST meet me requirement for the other factor?A . PassphraseB . OTPC . Security questionD . PINView AnswerAnswer: B
Which of the technician MOST likely recommend?
A technician is recommending preventive physical security controls for a server room. Which of the technician MOST likely recommend? (Select Two).A . GeofencingB . Video SurveillanceC . Protected cabinetsD . MantrapE . Key exchangeF . Authorized personnel signageView AnswerAnswer: C,D
Which of the following is an algorithm family that was developed for use cases in which power consumption and lower computing power are constraints?
Which of the following is an algorithm family that was developed for use cases in which power consumption and lower computing power are constraints?A . Elliptic curveB . RSAC . Diffie-HellmanD . SHAView AnswerAnswer: A
Which of the following should the manager use to control the network traffic?
After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?A . A DMZB . A VPNC . A VLAND . An ACLView AnswerAnswer: C
Which of the following tools has the team MOST likely deployed?
The director of information security at a company has recently directed the security engineering team to implement new security technologies aimed at reducing the impact of insider threats. Which of the following tools has the team MOST likely deployed? (Select TWO).A . DLFB . UTMC . SFTPD . SSHE ....
Buffer overflow can be avoided using proper.
Buffer overflow can be avoided using proper.A . memory leak preventionB . memory reuseC . input validationD . implementation of ASLRView AnswerAnswer: C
Which of the following describes the BEST approach for deploying application patches?
Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...
Which of the following controls should security put in place?
The security office has had reports of increased tailgating in the datacenter. Which of the following controls should security put in place?A . MantrapB . Cipher lockC . Fingerprint scannerD . Badge readerView AnswerAnswer: A
Which of the following security controls BEST mitigates social engineering attacks?
Which of the following security controls BEST mitigates social engineering attacks?A . Separation of dutiesB . Least privilegeC . User awareness trainingD . Mandatory vacationView AnswerAnswer: C
Which of the following changes should be implemented?
An organization wants to control user accounts and privileged access to database servers. The organization wants to create an audit trail of account requests and approvals, Out also wants to facilitate operational efficiency when account and access changes are needed. The organization has the following account management practices. - Access...