100%(4)4 out of 4 people found this document helpful
This preview shows page 11 - 14 out of 14 pages.
15.A company hired a firm to test the security posture of its database servers and determine if any vulnerabilities can be exploited. The company provided limited imformation pertaining to the infrastructure and database server. Which of the following forms of testing does this BEST describe?
The safer , easier way to help you pass any IT exams.11/ 12A. Black box B. Gray box C. White box D. Vulnerability scanning Answer:B 16.When considering IoT systems, which of the following represents the GREATEST ongoing risk after a vulnerability has been discovered? 17.A systems administrator has been assigned to create accounts for summer interns. The interns are only authorized to be in the facility and operate computers under close supervision. They must also leave the facility at designated times each day. However, the interns can access intern file folders without supervision. Which of the following represents the BEST way to configure the accounts? (Select TWO.) 18.An attachment that was emailed to finance employees contained an embedded message. The security administrator investigates and finds the intent was to conceal the embedded information from public view. Which of the following BEST describes this type of message? 19.If two employees are encrypting traffic between them using a single encryption key, which of the following agorithms are they using? A. RSA B. 3DES C. DSA D. SHA-2 Answer:D 20.An organization hosts a public-facing website that contains a login page for users who are registered
The safer , easier way to help you pass any IT exams.12/ 12and authorized to access a secure, non-public section of the site. That non-public site hosts information that requires multifactor authentication for access. Which of the following access management approaches would be the BEST practice for the organization?