1.
Which of the following activities often involves consulting with the legal department?
2.
Which of the following protocols is used to connect a remote office LAN into the central office so resources can be shared?
3.
Which of the following protocols uses a three-way handshake during communication with multiple hosts?
4.
Which of the following technologies requires encryption and authentication?
5.
A security administrator has received an SD memory card for the purpose of forensic analysis. The memory card is left on the administrator's office desk at the end of the day. The next day the security guard returns the SD card to the administrator because it was found by the night janitor. Which of the following incident response procedures has been violated?
6.
Organization policy requiring employees to display their corporate badge at all times is an example of:
7.
Which of the following cryptographic methods provides the STRONGEST security when implemented correctly?
8.
An on-going attack on a web server has just been discovered. This server is non-critical but holds data that could be very damaging to the company if it is disclosed. Which of the following should the administrator choose as their FIRST response?
9.
Which of the following uses both private and public key algorithms for email encryption and decryption?
10.
Which of the following is a common evasion technique by attackers to avoid reverse engineering?