Which of the following should the administrator use to fulfil the requirements?
An administrator wants to provide onboard hardware based cryptographic processing and secure key storage for full-disk encryption. Which of the following should the administrator use to fulfil the requirements?A . AESB . TPMC . FDED . PAMView AnswerAnswer: B
Which of the following security methods can provide protection against tour participants viewing sensitive information at minimal cost?
A company often processes sensitive data for the government. The company also processes a large amount of commercial work and as such is often providing tours to potential customers that take them into various workspaces. Which of the following security methods can provide protection against tour participants viewing sensitive information...
Which of the following rules is necessary to support this implementation?
A system administrator is implementing a firewall ACL to block specific communication to and from a predefined list of IP addresses, while allowing all other communication. Which of the following rules is necessary to support this implementation?A . Implicit allow as the last ruleB . Implicit allow as the first...
Which of the following BEST meets that requirement?
A security administrator needs a method to ensure that only employees can get onto the internal network when plugging into a network switch. Which of the following BEST meets that requirement?A . NACB . UTMC . DMZD . VPNView AnswerAnswer: A
Given this output, which of the following can be concluded?
A security analyst is reviewing the following output from an IPS: Given this output, which of the following can be concluded? (Select TWO).A . The source IP of the attack is coming from 250.19 18.22.B . The source IP of the attack is coming from 250 19.18.71.C . The attacker...
Which of the following categories BEST describes what she is looking for?
The Chief Technology Officer (CTO) of a company, Ann, is putting together a hardware budget for the next 10 years. She is asking for the average lifespan of each hardware device so that she is able to calculate when she will have to replace each device. Which of the following...
Which of the following is the BEST technical controls that will help mitigate this risk of disclosing sensitive data?
The security administrator receives an email on a non-company account from a coworker stating that some reports are not exporting correctly. Attached to the email was an example report file with several customers' names and credit card numbers with the PIN. Which of the following is the BEST technical controls...
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system While attempting to determine if an unauthorized user is togged into the home network, the user reviews the wireless router, which shows the following table for systems that are...
reduce the likelihood of this attack going undetected?
A security administrator returning from a short vacation receives an account lock-out message when attempting to log into the computer. After getting the account unlocked the security administrator immediately notices a large amount of emails alerts pertaining to several different user accounts being locked out during the past three days....
Which of the following would a security specialist be able to determine upon examination of a server's certificate?
Which of the following would a security specialist be able to determine upon examination of a server's certificate?A . CA public key 34B . Server private keyC . CSRD . OIDView AnswerAnswer: D