1.
Identify the service provided by message authentication code (MAC) hash:
2.
Which security policy will be most likely used while attempting to mitigate the risks involved with allowing a user to access company email via their cell phone?
3.
Which item will allow for fast, highly secure encryption of a USB flash drive?
4.
Communication is important to maintaining security because communication keeps:
5.
Which tool can help the technician to find all open ports on the network?
6.
Which security action should be finished before access is given to the network?
7.
To aid in preventing the execution of malicious code in email clients, which of the following should be done by the email administrator?
8.
In computing, virtualization is a broad term that refers to the abstraction of computer resources. Which is a security reason to implement virtualization throughout the network infrastructure?
9.
Which of the following access control models uses roles to determine access permissions?
10.
A user receives an email asking the user to reset the online banking username and password. The email contains a link and when the user accesses the link, the URL that appears in the browser does not match the link. This would be an example of: