what Ann has been asked to do?

Ann, a security administrator, has been tasked by the Chief Information Officer (CIO) to have the company’sapplication servers tested using black box methodology.Which of the following BEST describes what Ann has been asked to do? A. Verify the server’s patch level and attempt various knows exploits that might be possible due to missing security updates. […]

Read More

Which of the following options would BEST ensure employees are only viewing information associated to the customers they

XYZ Company has a database containing personally identifiable information for all its customers.Which of the following options would BEST ensure employees are only viewing information associated to thecustomers they support? A. Auditing B. Access Control C. Encryption D. Data ownership Explanation:http://searchsecurity.techtarget.com/definition/access-control Show Answer

Read More

which of the following security exposures would this le

An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the followingsecurity exposures would this lead to? A. A virus on the administrator’s desktop would be able to sniff the administrator’s username and password. B. Result in an attacker being able to phish the employee’s username and password. […]

Read More

Which of the following would explain the situation?

Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joereceives a response, he is unable to decrypt the response with the same key he used initially. Which of thefollowing would explain the situation? A. An ephemeral key was used for one of the messages B. A stream […]

Read More

Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?

Which of the following attack types is being carried out where a target is being sent unsolicited messages viaBluetooth? A. War chalking B. Bluejacking C. Bluesnarfing D. Rogue tethering Explanation:Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobilephones, PDAs or laptop computers, sending a vCard which typically contains a […]

Read More

Which of the following risk mitigation strategies should have been implemented when the supervisor was demoted?

A supervisor in your organization was demoted on Friday afternoon. The supervisor had the ability to modify thecontents of a confidential database, as well as other managerial permissions. On Monday morning, thedatabase administrator reported that log files indicated that several records were missing from the databaseWhich of the following risk mitigation strategies should have been […]

Read More

Which of the following technologies would BEST be suited to accomplish this?

A security technician would like to obscure sensitive data within a file so that it can be transferred withoutcausing suspicion. Which of the following technologies would BEST be suited to accomplish this? A. Transport Encryption B. Stream Encryption C. Digital Signature D. Steganography Explanation:Steganography is the process of hiding a message in another message so […]

Read More

Which of the following protocols should be used?

A system administrator needs to implement 802.1x whereby when a user logs into the network, theauthentication server communicates to the network switch and assigns the user to the proper VLAN.Which of the following protocols should be used? A. RADIUS B. Kerberos C. LDAP D. MSCHAP Show Answer

Read More