1.
A security administrator has implemented a policy to prevent data loss. Which of the following is the BEST method of enforcement?
2.
Which of the following data security techniques will allow Matt, an IT security technician, to encrypt a system with speed as its primary consideration?
3.
A large corporation has data centers geographically distributed across multiple continents. The company needs to securely transfer large amounts of data between the data center. The data transfer can be accomplished physically or electronically, but must prevent eavesdropping while the data is on transit. Which of the following represents the BEST cryptographic solution?
4.
A security administrator wants to ensure that the message the administrator sends out to their Chief Financial Officer (CFO) does not get changed in route. Which of the following is the administrator MOST concerned with?
5.
An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the computer is in use. Which of the following can be implemented?
6.
Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives?
7.
During a recent investigation, an auditor discovered that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. The SCADA systems cannot be modified without vendor approval which requires months of testing. Which of the following is MOST likely to protect the SCADA systems from misuse?
8.
Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?
9.
When considering a vendor-specific vulnerability in critical industrial control systems which of the following techniques supports availability?
10.
Which of the following devices would be the MOST efficient way to filter external websites for staff on an internal network?