1.
During a data exfiltration penetration test, which of the following is the NEXT step after gaining access to a system?
2.
Which of the following standards could be used to rate the risk exposure of vulnerabilities on a network?
3.
Which of the following should be protected from disclosure?
4.
Rule-based access control is closely aligned with which of the following?
5.
A user is recording a file on disk. Which of the following will allow a user to verify that the file is the original?
6.
The administrator needs to set permissions for the new print server for a company comprised of 320 people in 18 departments. Each department has its own set of printers. Which of the following options is the BEST way to do this?
7.
Which of the following is BEST used for providing protection against power fluctuation?
8.
Which of the following BEST describes the function of a NIDS?
9.
An employee with a regular user account has downloaded a software program which allowed the user to join the administrator group. Which of the following is occurring?
10.
Command-and-Control is a key element of a: