1.
Sara, a security administrator, needs to simplify the management of access to remote files and folders. Which of the following can she implement to BEST
accomplish this?
2.
Matt, a security administrator, wants to implement a secure wireless network. Which of the following is the MOST secure wireless protocol?
3.
Which of the following protocols allows for the LARGEST address space?
4.
In order to justify the cost of a new security appliance, the administrator should do which of the following?
5.
Which of the following is responsible for masking the activity of an on-going attack from the administrator's operating system monitoring tools?
6.
Which of the following forms of FTP uses TLS to securely send information?
7.
Which of the following BEST allows Jane, a security administrator, to perform ongoing assessments of existing weaknesses within an enterprise?
8.
Jane, an attacker, compromises a payroll system and replaces a commonly executed application with a modified version which appears to run as normal but also
executes additional functions. Which of the following would BEST describe the slightly modified application?
9.
To protect corporate data on removable media, a security policy should mandate that all removable devices use which of the following?
10.
Which of the following would allow Pete, a security analyst, to assess his company's proficiency with a particular security process?