1.
Which of the following sits inline with network traffic and helps prevent malicious behavior as it occurs by either dropping packets or correcting TCP stream related issues?
2.
Which of the following threats is mitigated by ensuring operating system patches are current?
3.
An administrator is concerned about the amount of time it would take to investigate email that may be subject to inspection during legal proceedings. Which of the following could help limit the company's exposure and the time spent on these types of proceedings?
4.
Which of the following BEST controls traffic between networks?
5.
Which of the following should be updated whenever software is upgraded on a production system?
6.
Which of the following BEST describes what users are required to provide in a two factor authentication system?
7.
A user reports that they opened an attachment from an email received through a distribution list. At a later date, several computers started behaving abnormally. Which of the following threats has MOST likely infected the computer?
8.
Which of the following describes the role of a proxy server?
9.
Which of the following would a security administrator use to perform vulnerability scanning without doing any penetration testing?
10.
An administrator believes a user has more access to a financial application than they should. Which of the following policies would this MOST likely violate?