1.
After installing database software the administrator must manually change the default administrative password, remove a default database, and adjust permissions on specific files. These actions are BEST described as:
2.
Which of the following is the BEST mitigation method to implement when protecting against a discovered OS exploit?
3.
Which of the following is the primary concern of governments in terms of data security?
4.
Which of the following is BEST used to change common settings for a large number of deployed computers?
5.
Which of the following solutions would a company be MOST likely to choose if they wanted to conserve rack space in the data center and also be able to manage various resources on the servers?
6.
A rogue wireless network is showing up in the IT department. The network appears to be coming from a printer that was installed. Which of the following should have taken place, prior to this printer being installed, to prevent this issue?
7.
Which of the following characteristics distinguishes a virus from a rootkit, spyware, and adware?
8.
Which of the following is used to generate keys in PKI?
9.
Which of the following methods is a best practice for granting access to resources?
10.
Which of the following may cause a user, connected to a NAC-enabled network, to not be prompted for credentials?