Which of the following would BEST secure the internal network and allow access to the needed servers?
A network technician is designing a network for a small company. The network technician needs to implement an email server and web server that will be accessed by both internal employees and external customers. Which of the following would BEST secure the internal network and allow access to the needed...
When used together, which of the following qualify as two-factor authentication?
When used together, which of the following qualify as two-factor authentication?A . Password and PINB . Smart card and PINC . Proximity card and smart cardD . Fingerprint scanner and iris scannerView AnswerAnswer: B
Which of the following BEST describes the type of attacks that are prevented by this security measure?
An organization has air gapped a critical system. Which of the following BEST describes the type of attacks that are prevented by this security measure?A . Attacks from another local network segmentB . Attacks exploiting USB drives and removable mediaC . Attacks that spy on leaked emanations or signalsD ....
Which of the following would offer the BEST protection against offline brute force attacks?
A security administrator is choosing an algorithm to generate password hashes. Which of the following would offer the BEST protection against offline brute force attacks?A . MD5B . 3DESC . AESD . SHA-1View AnswerAnswer: C
Which of the following BEST identifies this application attack?
An application developer has neglected to include input validation checks in the design of the company's new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code, to an application will allow the execution of the custom code at the administrator level. Which of the...
Which of the following should be used to achieve this objective for both wired and wireless networks?
An organization wants to ensure network access is granted only after a user or device has been authenticated. Which of the following should be used to achieve this objective for both wired and wireless networks?A . CCMPB . PKCS#12C . IEEE 802.1XD . OCSPView AnswerAnswer: C
Which of the following steps in the incident response process should be taken NEXT?
A Chief Information Security Officer (CISO) has instructed the information assurance staff to act upon a fast-spreading virus. Which of the following steps in the incident response process should be taken NEXT?A . IdentificationB . EradicationC . EscalationD . ContainmentView AnswerAnswer: A
Which of the following attacks is this deterrent MOST likely to mitigate?
The Chief Information Security Officer (CISO) in a company is working to maximize protection efforts of sensitive corporate data. The CISO implements a "100% shred" policy within the organization, with the intent to destroy any documentation that is not actively in use in a way that it cannot be recovered...
Which of the following identity access methods creates a cookie on the first login to a central authority to allow logins to subsequent applications without re-entering credentials?
Which of the following identity access methods creates a cookie on the first login to a central authority to allow logins to subsequent applications without re-entering credentials?A . Multifactor authenticationB . Transitive trustC . Federated accessD . Single sign-onView AnswerAnswer: D
Based on the information provided, which of the following is the problem when connecting to the website?
Recently clients are stating they can no longer access a secure banking site's webpage. In reviewing the clients' web browser settings, the certificate chain is showing the following: Certificate Chain: X Digi Cert Digi Cert High assurance C3 * banksite.com Certificate Store: Digi Cert - Others Certificate Store Digi Cert...