1.
Assigning access on a need-to-knows basis is a best practice in which of the following controls?
2.
Which of the following security threats MOST frequently uses IRC to communicate with a remote host?
3.
Which of the following can restrict a computer from receiving network traffic?
4.
The newly hired security administrator for a company suspects that the previous security administrator has maliciously left code to corrupt the logging systems in 30 days. Which of the following is suspected to be in the system?
5.
Which of the following would allow an administrator to perform internal research on security threats and common viruses on multiple operating systems without risking contamination of the production environment?
6.
PGP is a cryptosystem based on which of the following encryption method?
7.
Which of the following is the BEST solution for an administrator to implement in order to learn more about the zeroday exploit attacks on the internal network?
8.
A user reports that their system is slow and reboots on its own. The technician is unable to remotely control the computer and realizes that they no longer have administrative rights to that workstation. Which of the following is MOST likely the cause?
9.
Most mission impacting vulnerabilities in a formal risk assessment should be:
10.
Which of the following is a mitigation technique that addresses signal emanation?