1.
Which of the following algorithms is faster when encrypting data?
2.
Which of the following BEST describes the differences between RADIUS and TACACS?
3.
Which of the following allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem?
4.
An administrator wishes to hide the network addresses of an internal network when connecting to the Internet. The MOST effective way to mask the network
address of the users would be by passing the traffic through a:
5.
A technician is reviewing the logical access control method an organization uses. One of the senior managers requests that the technician prevent staff members
from logging on during non-working days. Which of the following should the technician implement to meet managements request?
6.
An administrator notices that former temporary employees accounts are still active on a domain. Which of the following can be implemented to increase security
and prevent this from happening?
7.
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-
malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not
adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per
hour. If the anti-malware software is purchased, which of the following is the expected net savings?
8.
Sara, a security administrator, suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries:
'or 1=1--
or1'=1--
'or1=1'--
Which of the following attacks is MOST likely occurring?
9.
Which of the following attacks would be used if Sara, a user, is receiving unwanted text messages?
10.
Matt, a security administrator, is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to
perform multiple roles within the organization. Which of the following is the BEST solution to allow the user to perform multiple roles?