You are asked to separate the Sales and Marketing department’s network traffic on a layer 2 device within a LAN. This will reduce broadcast traffic and prevent the departments from seeing each other’s resources. Which of the following types of network design would be the best choice? You are a network administrator and your company has asked you to perform a survey of the campus for open Wi-Fi access points. You walk around with your smartphone looking for unsecured access points that you can connect to without a password. What type of penetration testing concept is this called? Which of the following is a certificate-based authentication that allows individuals access to U.S. federal resources and facilities? You attempt to log into your company’s network with a laptop. The laptop is quarantined to a restricted VLAN until the laptop’s virus definitions are updated. Which of the following best describes this network component? You have been asked to implement a security control that will limit tailgating in high-secured areas. Which of the following security control would you choose? Your company’s network administrator is placing an Internet web server in an isolated area of the company’s network for security purposes. Which of the following architecture concepts is the network administrator implementing? Your company is offering a new product on its website. You are asked to ensure availability of the web server when it receives a large number of requests. Which of the following would be the best option to fulfill this request? You are a security administrator for a manufacturing company that produces compounded medications. To ensure individuals are not accessing sensitive areas where the medications are created, you want to implement a physical security control. Which of the following would be the best option? An attacker exploited a bug, unknown to the developer, to gain access to a database server. Which of the following best describes this type of attack? A new employee added network drops to a new section of the company’s building. The cables were placed across several fluorescent lights. When users attempted to connect to the data center on the network, they experienced intermittent connectivity. Which of the following environmental controls was the most likely cause of this issue? What method should you choose to authenticate a remote workstation before it gains access to a local LAN? Which of the following allows a company to store a cryptographic key with a trusted third party and release it only to the sender or receiver with proper authorization? Your company recently upgraded the HVAC system for its server room. Which of the following security implications would the company be most concerned about? Your company provides secure wireless Internet access to visitors and vendors working onsite. Some of the vendors are reporting they are unable to view the wireless network. Which of the following best describes the issue? Your company’s sales team is working late at the end of the month to ensure all sales are reported for the month. The sales members notice they cannot save or print reports after regular hours. Which of the following general concepts is preventing the sales members from performing their job? Which of the following symmetric algorithms are block ciphers? (Choose three.) A security officer has asked you to use a password cracking tool on the company’s computers. Which of the following best describes what the security officer is trying to accomplish? Which of the following test gives testers comprehensive network design information? You are the network administrator for your company and want to implement a wireless network and prevent unauthorized access. Which of the following would be the best option? Why is input validation important to secure coding techniques? (Choose two.) To authenticate, a Windows 10 user draws a circle around a picture of a dog’s nose and then touches each ear starting with the right ear. Which of the following concepts is this describing? Which of the following countermeasures is designed to best protect against a brute-force password attack? You are a security administrator reviewing the results from a network security audit. You are reviewing options to implement a solution to address the potential poisoning of name resolution server records. Which of the following would be the best choice? Your manager has implemented a new policy that requires employees to shred all sensitive documents. Which of the following attacks is your manager attempting to prevent? Which of the following cryptography algorithms support multiple bit strengths? A network security auditor will perform various simulated network attacks against your company’s network. Which should the security auditor acquire first? A system administrator is told an application is not able to handle the large amount of traffic the server is receiving on a daily basis. The attack takes the server offline and causes it to drop packets occasionally. The system administrator needs to find another solution while keeping the application secure and available. Which of the following would be the best solution? You are a security administrator and are observing unusual behavior in your network from a workstation. The workstation is communicating with a known malicious destination over an encrypted tunnel. You have updated the antivirus definition files and performed a full antivirus scan. The scan doesn’t show any clues of infection. Which of the following best describes what has happened on the workstation? You are the security engineer and have discovered that communication within your company’s encrypted wireless network is being captured with a sniffing program. The data being captured is then being decrypted to obtain the employee’s credentials to be used at a later time. Which of the following protocols is most likely being used on the wireless access point? (Choose two.) A network manager has implemented a strategy so that all workstations on the network will receive required security updates regularly. Which of the following best describes what the network manager implemented? Your manager wants to secure the FTP server by using SSL. Which of the following should you configure? You are an IT security officer and you want to classify and assess privacy risks throughout the development life cycle of a program or system. Which of the following tools would be best to use for this purpose? Which of the following types of risk analysis makes use of ALE? Which of the following statements best describes mandatory vacations? Users of your company have been visiting the website www.abccompany.com and a recent increase in virus detection has been noted. Your company has developed a relationship with another company using the web address www.abccompany.com, but not with the site that has been causing the increase of viruses. Which of the following would best describe this attack? Which of the following would you enable in a laptop’s BIOS to provide full disk encryption? Your company has hired a third-party auditing firm to conduct a penetration test against your network. The firm wasn’t given any information related to the company’s network. What type of test is the company performing? Server room access is controlled with proximity cards and records all entries and exits. These records are referred to if missing equipment is discovered, so employees can be identified. Which of the following must be prevented for this policy to become effective? Company users are stating they are unable to access the network file server. A company security administrator checks the router ACL and knows users can access the web server, email server, and printing services. Which of the following is preventing access to the network file server? An employee informs you that the Internet connection is slow and they are having difficulty accessing websites to perform their job. You analyze their computer and discover the MAC address of the default gateway in the ARP cache is not correct. What type of attack have you discovered? Tony, a college student, downloaded a free word editor program to complete his essay. After downloading and installing the software, Tony noticed his computer was running slow and he was receiving notifications from his antivirus program. Which of the following best describes the malware that he installed? Which of the following measures the amount of time required to return a failed device, component, or network to normal functionality? Natural disasters and intentional man-made attacks can cause the death of employees and customers. What type of impact is this? A user finds and downloads an exploit that will take advantage of website vulnerabilities. The user isn’t knowledgeable about the exploit and runs the exploit against multiple websites to gain access. Which of the following best describes this user? You are the IT security officer and you plan to develop a general cybersecurity awareness training program for the employees. Which of the following best describes these employees? The system administrator needs to secure the company’s data-at-rest. Which of the following would provide the strongest protection? Which of the following is a true statement about qualitative risk analysis? Which of the following firewalls tracks the operating state and characteristics of network connections traversing it? Which of the following are examples of PII? (Choose two.) An employee informs you they have lost a corporate mobile device. What is the first action you perform? You have created a backup routine that includes a full backup each Sunday night and a backup each night of all data that has changed since Sunday’s backup. Which of the following best describes this backup schedule? One of your colleagues attempted to ping a computer name and received the response of fe80::3281:80ea:b72b:0b55. What type of address did the colleague view? Which of the following defines the act of sending unsolicited messages to nearby Bluetooth devices? You are a system administrator and you are creating a public and private key pair. You have to specify the key strength. Which of the following would be your best choice? You are the security administrator for the sales department and the department needs to email high volumes of sensitive information to clients to help close sales. All emails go through a DLP scanner. Which of the following is the best solution to help the department protect the sensitive information? You are the IT security officer of your company and have established a security policy that requires users to protect all sensitive documents to avoid their being stolen. What policy have you implemented? Which of the following options can a security administrator deploy on a mobile device that will deter undesirable people from seeing the data on the device if it is left unattended? You are a system administrator and are asked to prevent staff members from using each other’s credentials to access secured areas of the building. Which of the following will best address this request? A sales manager has asked for an option for sales reps who travel to have secure remote access to your company’s database server. Which of the following should you configure for the sales reps? An attacker tricks one of your employees into clicking on a malicious link that causes an unwanted action on the website the employee is currently authenticated to. What type of attack is this? Which of the following is considered the strongest access control? Your company wants to expand its data center, but has limited space to store additional hardware. The IT staff needs to continue their operations while expansion is underway. Which of the following would best accomplish this expansion idea? Which of the following algorithms have known collisions? (Choose two.) Which of the following must a security administrator implement to allow customers, vendors, suppliers, and other businesses to obtain information while preventing access to the company’s entire network? The head of HR is conducting an exit interview with an IT network administrator named Matt. The interview questions include Matt’s view of his manager, why he is leaving his current position, and what he liked most about his job. Which of the following should also be addressed in this exit interview? Which of the following is considered the least secure authentication method? You are a security administrator for your company and have been asked to recommend a secure method for storing passwords due to recent brute-force attempts. Which of the following will provide the best protection? (Choose two.) You installed a WAP for a local coffee shop and have discovered the signal is extending into the parking lot. Which of the following configurations will best correct this issue? You are a network administrator for a bank. A branch manager discovers that the deskside employees have the ability to delete lending policies found in a folder within the file server. You review the permissions and notice the deskside employees have “modify” permissions to the folder. The employees should have read permissions only. Which of the following security principles has been violated? Which of the following concepts of cryptography ensures integrity of data by the use of digital signatures? Your manager has asked you to recommend a public key infrastructure component to store certificates that are no longer valid. Which of the following is the best choice? You are a backup operator and receive a call from a user asking you to send sensitive documents immediately because their manager is going to a meeting with the company’s executives. The user states the manager’s files are corrupted and he is attending the meeting in the next 5 minutes. Which of the following forms of social engineering best describes this situation? Which of the following controls can you implement together to prevent data loss if a mobile device is lost or stolen? (Choose two.) You are asked to find the MAC address on a Linux machine. Which of the following commands can you use to discover it? A chief security officer (CSO) notices that a large number of contractors work for the company. When a contractor leaves the company, the provisioning team is not notified. The CSO wants to ensure the contractors cannot access the network when they leave. Which of the following polices best supports the CSO’s plan? The CISO wants to strengthen the password policy by adding special characters to users’ passwords. Which of the following control best achieves this goal? Which of the following deployment models allows a business to have more control of the devices given to employees that handle company information? A network administrator uses their fingerprint and enters a PIN to log onto a server. Which of the following best describes this example? Your company wants to perform a privacy threshold assessment (PTA) to identify all PII residing in its systems before retiring hardware. Which of the following would be examples of PII? (Choose two.) Your HIPS is incorrectly reporting legitimate network traffic as suspicious activity. What is this best known as? Matt, a network administrator, is asking how to configure the switches and routers to securely monitor their status. Which of the following protocols would he need to implement on the devices? Your company has issued a hardware token-based authentication to administrators to reduce the risk of password compromise. The tokens display a code that automatically changes every 30 seconds. Which of the following best describes this authentication mechanism? You are the network administrator for your company’s Microsoft network. Your CISO is planning the network security and wants a secure protocol that will authenticate all users logging into the network. Which of the following authentication protocols would be the best choice? Which of the following is not a vulnerability of end-of-life systems? Which of the following statements are true regarding viruses and worms? (Choose two.) Which of the following wireless attacks would be used to impersonate another WAP to obtain unauthorized information from nearby mobile users? Tony, a security administrator, discovered through an audit that all the company’s access points are currently configured to use WPA with TKIP for encryption. Tony needs to improve the encryption on the access points. Which of the following would be the best option for Tony? Your department manager assigns Tony, a network administrator, the job of expressing the business and financial effects that a failed SQL server would cause if it was down for 4 hours. What type of analysis must Tony perform? You are the security administrator for a local hospital. The doctors want to prevent the data from being altered while working on their mobile devices. Which of the following would most likely accomplish the request? You are a Unix engineer, and on October 29 you discovered that a former employee had planted malicious code that would destroy 4,000 servers at your company. This malicious code would have caused millions of dollars worth of damage and shut down your company for at least a week. The malware was set to detonate at 9:00 a.m. on January 31. What type of malware did you discover? Which of the following is defined as hacking into a computer system for a politically or socially motivated purpose? A network administrator with your company has received phone calls from an individual who is requesting information about their personal finances. Which of the following type of attack is occurring? Which of the following can be restricted on a mobile device to prevent security violations? (Choose three.) Which of the following does a remote access VPN usually rely on? (Choose two.) Matt, a security administrator, wants to use a two-way trust model for the owner of a certificate and the entity relying on the certificate. Which of the following is the best option to use? If domain A trusts domain B, and domain B trusts domain C, then domain A trusts domain C. Which concept does this describe? A user entered a username and password to log into the company’s network. Which of the following best describes the username? Which of the following tools can be used to hide messages within a file? Which of the following is best used to prevent ARP poisoning on a local network? (Choose two.) Which of the following is the best practice to place at the end of an ACL?