Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case of loss or theft?

An administrator has concerns regarding the traveling sales team who works primarily from smart phones. Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case of loss or theft?A . Enable screensaver locks when the phones are not in use...

April 9, 2018 No Comments READ MORE +

Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case of loss or theft?

An administrator has concerns regarding the traveling sales team who works primarily from smart phones. Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case of loss or theft?A . Enable screensaver locks when the phones are not in use...

April 4, 2018 No Comments READ MORE +

Joe, the security administrator, sees this in a vulnerability scan report:

Joe, the security administrator, sees this in a vulnerability scan report: "The server 10.1.2.232 is running Apache 2.2.20 which may be vulnerable to a mod_cgi exploit." Joe verifies that the mod_cgi module is not enabled on 10.1.2.232. This message is an example of:A . a threat.B . a risk.C ....

April 2, 2018 No Comments READ MORE +

Which of the following steps should the responder perform NEXT?

An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?A . Capture and document necessary information to assist in the response.B . Request the user capture and provide a...

March 29, 2018 No Comments READ MORE +

Which of the following is the summary of loss for a given year?

Which of the following is the summary of loss for a given year?A . MTBFB . ALEC . SLAD . AROView AnswerAnswer: B

March 21, 2018 No Comments READ MORE +

Which of the following should be used in the code?

A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Select TWO.)A . Escrowed keysB . SSL symmetric encryption keyC . Software code...

March 19, 2018 No Comments READ MORE +

Which of the following encryption methods does PKI typically use to securely protect keys?

Which of the following encryption methods does PKI typically use to securely protect keys?A . Elliptic curveB . Digital signaturesC . AsymmetricD . ObfuscationView AnswerAnswer: C Explanation: https://blog.finjan.com/what-is-public-key-infrastructure-pki-and-how-is-it-used-in-cyber-security/

March 15, 2018 No Comments READ MORE +

Which of the following cryptographic attacks would salting of passwords render ineffective?

Which of the following cryptographic attacks would salting of passwords render ineffective?A . Brute forceB . DictionaryC . Rainbow tablesD . BirthdayView AnswerAnswer: B

March 11, 2018 No Comments READ MORE +

A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject Alternative Name (SAM) attribute of a certificate?

A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject Alternative Name (SAM) attribute of a certificate?A . It can protect multiple domainsB . It provides extended site validationC . It does not require a trusted certificate authorityD ....

March 2, 2018 No Comments READ MORE +

Which of the following is the MOST likely cause for this error message?

When trying to log onto a company's new ticketing system, some employees receive the following message: Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error...

March 1, 2018 No Comments READ MORE +