1.
An administrator discovers evidence that a co-worker has been violating the law with the contents of some of their emails. Which of the following should the administrator do FIRST?
2.
Which of the following can be implemented to mitigate the risks associated with open ports on a server?
3.
Which of the following should an HVAC system do when a fire is detected in a data center?
4.
Which of the following encryption implementations would be the MOST secure?
5.
Which of the following allows a technician to retroactively identify a security incident?
6.
A number of users on the company network have been contracting viruses from required social networking sites. Which of the following would be MOST effective to prevent this from happening?
7.
Which of the following would a technician implement to mitigate SQL injection security risks?
8.
Which of the following concepts is applied when a user enters a password to gain authorized access to a system?
9.
Which of the following vulnerability assessment tools would be used to identify weaknesses in a Company's router ACLs or firewall?
10.
Which of the following is a benefit of network access control (NAC)?