1.
Pete, a system administrator, is using a packet sniffer to troubleshoot remote authentication. Pete detects a device trying to communicate to UDP ports 1812 and

1813. Which of the following authentication methods is MOST likely being attempted?
2.
Which of the following is an example of authentication using something Jane, a user, has and something she knows?

 
3.
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee's credential?
4.
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?
5.
Which of the following does Jane, a software developer, need to do after compiling the source code of a program to attest the authorship of the binary?
6.

During the analysis of malicious code, Matt, a security analyst, discovers JavaScript being used to send random data to another service on the same system. This
is MOST likely an example of which of the following?
7.
A company's backup solution performs full backups weekly and is running into capacity issues. Without changing the frequency of backups, which of the following
solutions would reduce the storage requirement?
8.
3DES is created when which of the following scenarios occurs?
9.
Which of the following mitigates the risk of proprietary information being compromised?
10.
Which of the following security tools can Jane, an administrator, implement to mitigate the risks of theft?