Which of the following types of controls does this BEST describe?

A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?A . DeterrentB . PreventiveC . DetectiveD . CompensatingView AnswerAnswer: A

January 15, 2018 No Comments READ MORE +

Which of the following could best prevent this from occurring again?

During a routine audit, it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring...

January 15, 2018 No Comments READ MORE +

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?A . The recipient can verify integrity of the software patch.B . The recipient can verify the authenticity of the site used to download the patch.C . The...

January 14, 2018 No Comments READ MORE +

Which of the following security measures did the technician MOST likely implement to cause this Scenario?

A technician is configuring a wireless guest network. After applying the most recent changes the technician finds the new devices can no longer find the wireless network by name but existing devices are still able to use the wireless network. Which of the following security measures did the technician MOST...

January 14, 2018 No Comments READ MORE +

more information on this traffic?

While reviewing the monthly internet usage it is noted that there is a large spike in traffic classified as "unknown" and does not appear to be within the bounds of the organizations Acceptable Use Policy. Which of the following tool or technology would work BEST for obtaining more information on...

January 13, 2018 No Comments READ MORE +

attack successful?

Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message. Which of the following principles of social engineering made this attack successful?A ....

January 13, 2018 No Comments READ MORE +