Which of the following commands should be used?
An auditor wants to test the security posture of an organization by running a tool that will display the following: Which of the following commands should be used?A . nbtstatB . ncC . arpD . ipconfigView AnswerAnswer: A
Which of the following would a security specialist be able to determine upon examination of a server’s certificate?
Which of the following would a security specialist be able to determine upon examination of a server’s certificate?A . CA public keyB . Server private keyC . CSRD . OIDView AnswerAnswer: D
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system. While attempting to determine if an authorized user is logged into the home network, the user reviews the wireless router, which shows the following table for systems that are...
Which of the following security controls does an iris scanner provide?
Which of the following security controls does an iris scanner provide?A . LogicalB . AdministrativeC . CorrectiveD . PhysicalE . DetectiveF . DeterrentView AnswerAnswer: D
Select the appropriate attack from each drop down list to label the corresponding illustrated attack
HOTSPOT Select the appropriate attack from each drop down list to label the corresponding illustrated attack. Instructions: Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit. View AnswerAnswer:
Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?
Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?A . SustainabilityB . HomogeneityC . ResiliencyD . ConfigurabilityView AnswerAnswer: C
Which of the following encryption methods does PKI typically use to securely project keys?
Which of the following encryption methods does PKI typically use to securely project keys?A . Elliptic curveB . Digital signaturesC . AsymmetricD . ObfuscationView AnswerAnswer: B
A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation?
A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation?A . An attacker can access and change the printer configuration.B . SNMP data leaving the printer...
As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technical must ensure the OS settings are hardened. Which of the following is the BEST way to do this?
As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technical must ensure the OS settings are hardened. Which of the following is the BEST way to do this?A . Use a vulnerability scanner.B . Use a configuration compliance scanner.C . Use a...
You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan
DRAG DROP You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan. Instructions: All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simulation, please select...