A security administrator recently reset local passwords and the following values were recorded in the system:
Which of the following in the security administrator most likely protecting against?
Which of the following security control types does an acceptable use policy best represent?
An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?
Which of the following is the stage in an investigation when forensic images are obtained?
Which of the following activities should a systems administrator perform to quarantine a potentially infected system?
Which of the following best describe a penetration test that resembles an actual external attach?
Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:
Which of the following is the most likely way a rogue device was allowed to connect?
Which of the following best describe why a process would require a two-person integrity security control?
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?