Which of the following types of controls does this BEST describe?
A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?A . DeterrentB . PreventiveC . DetectiveD . CompensatingView AnswerAnswer: A
Which of the following could best prevent this from occurring again?
During a routine audit, it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring...
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?A . The recipient can verify integrity of the software patch.B . The recipient can verify the authenticity of the site used to download the patch.C . The...
Which of the following security measures did the technician MOST likely implement to cause this Scenario?
A technician is configuring a wireless guest network. After applying the most recent changes the technician finds the new devices can no longer find the wireless network by name but existing devices are still able to use the wireless network. Which of the following security measures did the technician MOST...
more information on this traffic?
While reviewing the monthly internet usage it is noted that there is a large spike in traffic classified as "unknown" and does not appear to be within the bounds of the organizations Acceptable Use Policy. Which of the following tool or technology would work BEST for obtaining more information on...
attack successful?
Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message. Which of the following principles of social engineering made this attack successful?A ....