Which of the following is the MOST likely cause of this policy violation and the BEST remediation to prevent a reoccurrence'?
An organization has the following written policies: • Users must request approval for non-standard software installation • Administrators will perform all software installations • Software must be installed from a trusted repository A recent security audit identified crypto-currency software installed on one user's machine There are no indications of compromise...
Which of the following is an AAA solution that will provide the required wireless authentication?
A company wants to provide centralized authentication for its wireless system. The wireless authentication system must integrate with the directory back end. Which of the following is an AAA solution that will provide the required wireless authentication?A . TACACS+B . MSCHAPv2C . RADIUSD . LDAPView AnswerAnswer: C
Which of the following protocols must be supported by both the RADIUS server and the WAPs?
A systems engineer is setting up a RADIUS server to support a wireless network that uses certificate authentication. Which of the following protocols must be supported by both the RADIUS server and the WAPs?A . CCMPB . TKIPC . WPSD . EAPView AnswerAnswer: D
Which of the following command line tools should the analyst use to perform the Initial assessment?
A security analyst is asked to check the configuration of the company's DNS service on the server. Which of the following command line tools should the analyst use to perform the Initial assessment?A . nslookup/dlgB . tracedC . ipconfig/ifconfigD . tcpdumpView AnswerAnswer: B
Which of the following can be used to ensure the security of the document while in transit and at rest?
A user wants to send a condential message to a customer to ensure unauthorized users cannot access the information. Which of the following can be used to ensure the security of the document while in transit and at rest?A . BCRYPTB . PGPC . FTPSD . S/MIMEView AnswerAnswer: B
Which of the following is the administrator protecting against?
A systems administrator is increasing the security settings on a virtual host to ensure users on one VM cannot access information from another VM. Which of the following is the administrator protecting against?A . VM sprawlB . VM escapeC . VM migrationD . VM sandboxingView AnswerAnswer: B
Which of the following concepts of cryptography is shown?
Given the following: > md5.exe filel.txt > ADIFAB103773DC6A1E6021B7E503A210 > md5.exe file2.txt > ADIFAB103773DC6A1E602lB7E503A210 Which of the following concepts of cryptography is shown?A . CollisionB . SaltingC . SteganographyD . Stream cipherView AnswerAnswer: B
Which of the following would be the FIRST step to implement the SSL certificate?
A security engineer wants to add SSL to the public web server. Which of the following would be the FIRST step to implement the SSL certificate?A . Download the web certificate.B . Install the intermediate certificate.C . Generate a CSE . Encrypt the private key.View AnswerAnswer: C
Which of the following describes the BEST approach for deploying application patches?
Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...
Which of the following BEST represents what happened?
Staff members of an organization received an email message from the Chief Executive Officer (CEO) asking them for an urgent meeting in the main conference room. When the staff assembled, they learned the message received was not actually from the CEO. Which of the following BEST represents what happened?A ....