historic connection patterns and analysis of new threats to provide effective
mitigation responses?
• A. Behavior security
• B. Information Identity Management
• C. Unauthorized hacking
• D. Authorized hacking
A. Behavior security
A web developer wants to ensure that a new web application is not vulnerable to
brute-force attacks. Which of the following best practices is MOST useful to meet
this goal?
• A. Input validation
• B. System updates
• C. Password lockout
• D. Login auditing
C. Password lockout
Which of the following is the number of bytes that is in 2KB?
• A. 1024
• B. 2048
• C. 20000
• D. 1048576
B. 2048
A WPA2 enterprise wireless network has been subject to several attacks within the
last month. Which of the following would be the BEST option to improve the security
of the network?
• A. Change the SSID.
• B. Change the default password.
• C. Change to WEP security.
• D. Create a guest network.
D. Create a guest network
Which of the following is the BEST overall storage option for a laptop?
• A. Flash drive
• B. Hard drive
• C. SD card
• D. Solid-state drive
, D. Solid-state drive
A technician has worked through all steps of the troubleshooting methodology and
has not been able to resolve the issue. Which of the following should the technician
do NEXT?
• A. Escalate as necessary.
• B. Confirm the root cause.
• C. Establish a new theory.
• D. Gather information.
A. Escalate as necessary.
A network has been infected with a worm. Which of the following would be the BEST
security measures to take? (Choose two.)
• A. Update the IPS signatures.
• B. Update the network firewall.
• C. Update the malware definitions.
• D. Quarantine the network.
• E. Reset the network router.
• F. Contact the ISP.
C. Update the malware definitions
D. Quarantine the network
The marketing department contacts the web development team and states that
they are receiving inconsistent values in a newly launched form. Which of the
following is MOST likely the problem?
• A. Private browsing is being used by some clients visiting the site.
• B. Client-side scripting has been deactivated on some clients visiting the site.
• C. Legacy browsers that do not support scripting are being used by
some clients.
• D. Server-side scripting has been deactivated by the server administrator.
B. Client-side scripting has been deactivated on some clients visiting the
site.
Which of the following is MOST likely to be considered protected personal
information?
• A. Property tax records
• B. Court records
• C. Medical records
• D. Genealogy records
C. Medical records