An internal intranet site is required to authenticate users and restrict access to content to only those who are authorized to view it The site administrator previously encountered issues with credential spoofing when using the default NTLM setting and wants to move to a system that will be more resilient to replay attacks Which of the following should the administrator implement?
An internal intranet site is required to authenticate users and restrict access to content to only those who are authorized to view it The site administrator previously encountered issues with credential spoofing when using the default NTLM setting and wants to move to a system that will be more resilient...
A credentialed vulnerability scan is often preferred over a non-credentialed scan because credentialed scans:
A credentialed vulnerability scan is often preferred over a non-credentialed scan because credentialed scans:A . generates more false positives.B . rely solely on passive measures.C . are always non-intrusive.D . provide more accurate data.View AnswerAnswer: D
Which of the following concerns is MOST likely to be raised as a possible security issue in relation Io these devices?
A company is deploying MFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation Io these devices?A . Sensitive scanned materials being saved on the local hard driveB . Faulty...
Which of the following is the MOST important consideration for physical security within the datacenter?
When building a hosted datacenter. Which of the following is the MOST important consideration for physical security within the datacenter?A . Security guardsB . CamerasC . Secure enclosuresD . BiometricsView AnswerAnswer: A
Which of the following would provide a safe environment for an application to access only the resources needed to function while not having access to run at the system level?
Which of the following would provide a safe environment for an application to access only the resources needed to function while not having access to run at the system level?A . SandboxB . HoneypotC . GPOD . DMZView AnswerAnswer: A
Which of the following technologies should the coffee shop use in place of PSK?
A local coffee shop runs a small WiFi hotspot for its customers that utilizes WPA2-PSK. The coffee shop would like to stay current with security trends and wants to implement WPA3 to make its WiFi even more secure. Which of the following technologies should the coffee shop use in place...
following cloud deployment models BEST fits the agency's needs?
A government agency with sensitive information wants to virtualize its infrastructure. Which of the following cloud deployment models BEST fits the agency's needs?A . PublicB . CommunityC . PrivateD . HybridView AnswerAnswer: C
Hotspot Question
Hotspot Question The security administration has installed a new firewall which implements an implicit DENY policy by default. INSTRUCTIONS Click on the firewall and configure it to allow ONLY the following communication: - The Accounting workstation can ONLY access the web server on the public network over the default HTTPS...
Which of the following is the BEST control to address this audit finding?
A company needs to fix some audit findings related to its physical security. A key finding was that multiple people could physically enter a location at the same time. Which of the following is the BEST control to address this audit finding?A . Faraday cageB . MantrapC . BiometricsD ....
Which of the following would BEST meet these requirements?
A security engineer at an offline government facility is concerned about the validity of an SSL certificate. The engineer wants to perform the fastest check with the least delay to determine if the certificate has been revoked. Which of the following would BEST meet these requirements?A . RAB . OCSPC...