1.
After the maximum number attempts have failed, which of the following could set an account to lockout for 30 minutes?
2.
You work as a network technician. You have been asked to reconstruct the infrastructure of an organization. You should make sure that the virtualization technology is implemented securely. What should be taken int 
consideration while implementing virtualization technology?
3.
Which of the following is the BEST place to obtain a hotfix or patch for an application or system?
4.
Which algorithms can best encrypt large amounts of data?
5.
Which of the following is a suppression method for a Class C fire?
6.
Look at the following items carefully, which one is a cryptographic representation of non- repudiation?
7.
Which of the following can be used by an attacker to footprint a system?
8.
You work as a network administrator for your company. Your company requires you to improve the physical security of a data center located inside the office building. The data center already maintains a physical access log and has a video surveillance system. Which additional control can be performed?
9.
After analyzing vulnerability and applying a security patch, which non-intrusive action should be taken to verify that the vulnerability was truly removed?
10.
Which item best describes an instance where a biometric system identifies legitimate users as being unauthorized?