1.
Pete, an IT security technician, has been tasked with implementing physical security controls for his company's workstations. Which of the following BEST meets this need?
2.
Which of the following creates ciphertext by replacing one set of characters for another?
3.
Sara, the IT Manager, would like to ensure that the router and switches are only available from the network administrator's workstation. Which of the following would be the MOST cost effective solution to ensure that only the network administrator can access these devices?
4.
A company is performing internal security audits after a recent exploitation on one of their proprietary applications. Sara, the security auditor, is given the
workstation with limited documentation regarding the application installed for the audit. Which of the following types of testing methods is this?
5.
A web server sitting in a secure DMZ has antivirus and anti-malware software which updates daily. The latest security patches are applied and the server does not
run any database software. A day later, the web server is compromised and defaced. Which of the following is the MOST likely type of attack?
6.
Which of the following protocols is MOST likely associated with network audit logging?
7.
Pete, a security administrator, is asked to install and configure centralized software to securely manage and collect statistics from all of the company's network
devices. Which of the following should the software support?
8.
Matt, an account manager, arrives at work early in the morning and cannot log into his workstation. He calls the help desk an hour later to open a trouble ticket, but
they tell him there is nothing wrong with his account. Matt tries his login once more and is granted access. Which of the following control types BEST explains this
anomaly?
9.
A targeted email attack sent to Sara, the company's Chief Executive Officer (CEO), is known as which of the following?
10.
Which of the following network devices allows web traffic to be distributed amongst servers?