168# DRAG DROP -
...
185# Which of the following works by implanting software on...
163# A company is developing a new system that will unlock a...
182# Company policy requires the use if passphrases instead if...
167# A security analyst is investigating a suspected security...
171# A new mobile application is being developed in-house....
#101 Which of the following must be intact for evidence to be...
108 # A Chief Information Officer (CIO) drafts an agreement...
109 # Which of the following would meet the requirements for...
147# An organization is comparing and contrasting migration from...
130# Which of the following vulnerability types would the type of...
120# Which of the following precautions MINIMIZES the risk from...
177# Although a web enabled application appears to only allow...
#141 Which of the following types of attacks precedes the...
164# A security analyst accesses corporate web pages and inputs...
149# A user is presented with the following items during the new-hire...
154# A security analyst reviews the following output:
...
112 # Before an infection was detected, several of the infected...
116# As part of the SDLC, a third party is hired to perform a...
155# A company's AUP requires:
...
175# A technician is configuring a wireless guest network. After...
157# A security analyst notices anomalous activity coming from...
181# A security administrator has been tasked with improving the...
158# An employee receives an email, which appears to be from the...
183# During a routine audit, it is discovered that someone has...
198# A member of a digital forensics team, Joe arrives at a crime...
104 # A technician suspects that a system has been compromised....
194# An administrator has concerns regarding the traveling sales...
110 # A manager suspects that an IT employee with elevated...
123# During a monthly vulnerability scan, a server was flagged...
135# A company hires a third-party firm to conduct an assessment...
187# Technicians working with servers hosted at the company's...
160# A group of non-profit agencies wants to implement a cloud...
103 # Which of the following cryptography algorithms will produce...
174# The security administrator receives an email on a...
159# An information security analyst needs to work with an...
186# A web application is configured to target browsers and allow...
137# Joe, a user, wants to send Ann, another user, a confidential...
190# A technician has installed new vulnerability scanner...
139# To reduce disk consumption, an organization's legal...
142# Which of the following cryptographic algorithms is...
111 # A penetration tester finds that a company's login...
113# A systems administrator is reviewing the following...
115# The availability of a system has been labeled as the highest...
151# A network technician is setting up a segmented network that...
131# An in-house penetration tester is using a packet capture...
132# A black hat hacker is enumerating a network and wants to...
133# A development team has adopted a new approach to projects in...
178# An attacker discovers a new vulnerability in an enterprise...
126# Which of the following AES modes of operation provide...
140# A security administrator is configuring a new network...
172# A security administrator is creating a subnet on one of the...
188# A portable data storage device has been determined to have...
161# An administrator is configuring access to information...
102 # A vulnerability scanner that uses its running service's...
117# A dumpster diver recovers several hard drives from a company...
119# An application developer is designing an application...
150# An organization requires users to provide their fingerprints...
121# After an identified security breach, an analyst is tasked to...
184# Which of the following should identify critical systems and...
199# An organization has hired a penetration tester to test the...
189# A security administrator must implement a system to ensure...
138# A director of IR is reviewing a report regarding several...
195# A user of the wireless network is unable to gain access to...
193# A network administrator wants to ensure that users do not...
114# Joe, a security administrator, needs to extend the...
118# Which of the following are methods to implement HA in a web...
144# A workstation puts out a network request to locate another...
152# After a routine audit, a company discovers that engineering...
180# A bank requires tellers to get manager approval when a...
136# An organization uses SSO authentication for employee access...
197# A mobile device user is concerned about geographic...
165# Which of the following differentiates a collision attack...
166# A help desk is troubleshooting user reports that the...
191# The Chief Security Officer (CISO) at a multinational banking...
105# A new firewall has been placed into service at an...
143# A security analyst receives an alert from a WAF with the...
192# While reviewing the monthly internet usage it is noted that...
107# Which of the following are the MAIN reasons why a systems...
145# Audit logs from a small company's vulnerability scanning...
146# A security analyst wants to harden the company's VoIP...
170# After a merger between two companies a security analyst has...
173# A company has a security policy that specifies all endpoint...
134# A Chief Executive Officer (CEO) suspects someone in the lab...
179# A security administrator returning from a short vacation...
Which of the following is NOT a common type of social engineering...
156# An organization's primary datacenter is experiencing a...
128# A security engineer is configuring a wireless network that...
127# An audit takes place after company-wide restricting, in...
129# A system administrator has finished configuring firewall ACL...
A security analyst is testing both Windows and Linux systems for...
169# A security administrator is trying to encrypt communication. For...
148# A security administrator suspects a MITM attack aimed at...
200# A security engineer is faced with competing requirements...
153# A security analyst has received the following alert snippet from...
124# ...
196# A chief Financial Officer (CFO) has asked the Chief...
176# A security administrator has been assigned to review the...
162# A copy of a highly confidential salary report was recently found...
122# A company was recently audited by a third party. The audit...