1.
Which of the following is a way to gain access to a protected system while another user is entering credentials?
2.

Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees to have secure remote access to certain internal
network services such as file servers?
3.
Jane, a security administrator, needs to deploy a wireless network where the wireless encryption key is negotiated automatically. Which of the following MUST be
implemented?
4.
Which of the following can be implemented on the company gateway router to prevent IP packets with a source IP of the internal company network from being
routed by the external interface of the router into the company's network?
5.
Which of the following BEST explains the security benefit of a standardized server image?
6.
Jane, the security administrator for a company, needs to assign permissions for users on her network. Which of the following would allow Jane to give ONLY the
appropriate permissions necessary?
7.
Users in the marketing department are given a different level of access to files than users in the accounting department. Which of the following types of access
control does this BEST describe?
8.
Which of the following types of data encryption would Jane, a security administrator, use if MBR and the file systems needed to be included?
9.
Sara, an employee, enters the datacenter but does not ensure the door was fully closed afterwards. Which of the following could directly result from this situation?
10.
Which of the following should Pete, the security administrator, change to help mitigate the risk associated with war drivers discovering the wireless network?