Which of the following BEST describes a routine in which semicolons, dashes, quotes, and commas are removed from a string?

Which of the following BEST describes a routine in which semicolons, dashes, quotes, and commas are removed from a string?A . Error handling to protect against program exploitationB . Exception handling to protect against XSRF attacksC . Input validation to protect against SQL injectionD . Padding to protect against string...

February 25, 2018 No Comments READ MORE +

Which of the following technologies employ the use of SAML? (Select TWO).

Which of the following technologies employ the use of SAML? (Select TWO).A . Single sign-onB . FederationC . LDAPD . Secure tokenE . RADIUSView AnswerAnswer: AB

February 22, 2018 No Comments READ MORE +

Which of the following risk mitigation strategies should have been implemented when the supervisor was demoted?

A supervisor in your organization was demoted on Friday afternoon. The supervisor had the ability to modify the contents of a confidential database, as well as other managerial permissions. On Monday morning, the database administrator reported that log files indicated that several records were missing from the database. Which of...

February 18, 2018 No Comments READ MORE +

Which of the following characteristics BEST describes what the CIO has requested?

In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?A . ElasticityB . ScalabilityC . High availabilityD . RedundancyView AnswerAnswer: A...

February 15, 2018 No Comments READ MORE +

Which of the following should the administrator implement to meet the above requirements?

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: * All access must be correlated to a user account. * All user accounts must be assigned to a single individual. *...

January 31, 2018 No Comments READ MORE +

Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case of loss or theft?

An administrator has concerns regarding the traveling sales team who works primarily from smart phones. Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case of loss or theft?A . Enable screensaver locks when the phones are not in use...

January 23, 2018 No Comments READ MORE +

Hotspot Question

Hotspot Question Select the appropriate attack from each drop down list to label the corresponding illustrated attack Instructions: Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit. View AnswerAnswer: Explanation: 1:...

January 21, 2018 No Comments READ MORE +

Which of the following would explain the situation?

Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe receives a response, he is unable to decrypt the response with the same key he used initially. Which of the following would explain the situation?A . An ephemeral key was used for...

January 20, 2018 No Comments READ MORE +

A bank requires tellers to get manager approval when a customer wants to open a new account. A recent audit shows that there have been four cases in the previous year where tellers opened accounts without management approval. The bank president thought separation of duties would prevent this from happening.

A bank requires tellers to get manager approval when a customer wants to open a new account. A recent audit shows that there have been four cases in the previous year where tellers opened accounts without management approval. The bank president thought separation of duties would prevent this from happening....

January 17, 2018 No Comments READ MORE +

Which of the following forms of authentication are being used?

A company is currently using the following configuration: * IAS server with certificate-based EAP-PEAP and MSCHAP * Unencrypted authentication via PAP A security administrator needs to configure a new wireless setup with the following configurations: * PAP authentication method * PEAP and EAP provide two-factor authentication Which of the following...

January 15, 2018 No Comments READ MORE +