Which of the following should the administrator implement?

A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?A . DMZB . NATC . VPND . PATView AnswerAnswer: C

November 3, 2018 No Comments READ MORE +

Which of the following technical modifications to the architecture and corresponding security controls should be implemented to provide the MOST complete protection of data?

The Chief Security Officer (CISO) at a multinational banking corporation is reviewing a plan to upgrade the entire corporate IT infrastructure. The architecture consists of a centralized cloud environment hosting the majority of data, small server clusters at each corporate location to handle the majority of customer transaction processing, ATMs,...

November 1, 2018 No Comments READ MORE +

Which of the following assessment techniques is BEST described in the analyst's report?

A security analyst has been asked to perform a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of another developer's code. Which of the following assessment techniques is BEST described in...

October 30, 2018 No Comments READ MORE +

Drag and Drop Question

Drag and Drop Question Drag and drop the correct protocol to its default port. View AnswerAnswer: Explanation: FTP uses TCP port 21. Telnet uses port 23. SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. Secure Copy...

October 28, 2018 No Comments READ MORE +

Which of the following should the analyst implement to meet these requirements?

A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select TWO). A. Generate an X 509-complaint certificate...

October 26, 2018 No Comments READ MORE +

Which of the following has the application programmer failed to implement?

Although a web enabled application appears to only allow letters in the comment field of a web form, malicious user was able to carry a SQL injection attack by sending special characters through the web comment field. Which of the following has the application programmer failed to implement?A . Revision...

October 13, 2018 No Comments READ MORE +

user disable to achieve the stated goal?

A mobile device user is concerned about geographic positioning information being included in messages sent between users on a popular social network platform. The user turns off the functionality in the application, but wants to ensure the application cannot re-enable the setting without the knowledge of the user. Which of...

October 11, 2018 No Comments READ MORE +

Which of the following is the GREATEST risk to a company by allowing employees to physically bring their personal smartphones to work?

Which of the following is the GREATEST risk to a company by allowing employees to physically bring their personal smartphones to work?A . Taking pictures of proprietary information and equipment in restricted areas.B . Installing soft token software to connect to the company's wireless network.C . Company cannot automate patch...

October 11, 2018 No Comments READ MORE +

Which of the following policies or procedures co have prevented this from occurring?

A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures co have prevented this from...

October 9, 2018 No Comments READ MORE +

Which of the following encryption solutions should be deployed in this situation?

A Security Officer on a military base needs to encrypt several smart phones that will be going into the field. Which of the following encryption solutions should be deployed in this situation?A . Elliptic curveB . One-time padC . 3DESD . AES-256View AnswerAnswer: D

September 28, 2018 No Comments READ MORE +