1.
Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits long. Which of the following hashing methods would
Matt have to use to obtain this digital fingerprint?
2.
Which of the following would Jane, a security administrator, use to authenticate remote users into the network?
3.
A company wants to implement a policy that helps reduce employee stress and decrease the likelihood of security incidents caused by job dissatisfaction. Which of
the following will MOST likely have a positive impact on the employee stress and job satisfaction?
4.
Pete would like to implement a new tape backup plan for HR to speed up the process of nightly backups on their file systems HR does not make many file
alterations on Tuesday through Thursday. Pete does a full backup on Monday and again on Friday. Which of the following should Pete do to speed up the backups
Tuesday through Thursday?
5.
Hashing algorithms are used to address which of the following?
6.
After setting up a root CA. which of the following can Pete, a security administrator, implement to allow intermediate CAs to handout keys and certificates?
7.
Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?
8.
Which of the following is the purpose of the spanning tree protocol?
9.
Sara, the security engineer, has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should Sara
collect FIRST?
10.
While traveling, users need access to an internal company web server that contains proprietary information. Pete, the security administrator, should implement a: