Which of the following can allow an attacker to bypass authentication?
While doing a penetration test, auditors found an old credential hash for a privileged user. To prevent a privileged user's hash from being cached, what is the MOST appropriate policy to mandate?
An organization wishes to utilize a managed Domain Name System (DNS) provider to reduce the risk of users accessing known malicious sites when web browsing. The organization operates DNS forwarders that forward queries for all external domains to the DNS provider. Which of the following techniques could enable the organization to identify client systems that have attempted to access known malicious domains?
Which of the following planes directs the flow of data within a Software-Defined Networking (SDN) architecture?
Which of the following tools is used to evaluate the impact that a production plan has on capacity?
An attacker wants to decrypt a message and has no knowledge of what may have been in the original message. The attacker chooses to use an attack that will exhaust the keyspace in order to decrypt the message. What type of cryptanalytic attack is the attacker using?
In the context of mobile device security, which of the following BEST describes why a walled garden should be implemented?
What document MOST likely states an organization’s values?
Which technology is BEST suited to establish a secure communications link between an individual’s home office and the organization’s Local Area Network (LAN)?
When conducting a vulnerability test using a scanner tool, which unintended consequence can occur?
An organization has identified that an individual has failed to adhere to a given standard set by the organization. Based on the needs of the organization, it was decided that an exception process will be created. What is the PRIMARY benefit of establishing an exception process?
Bad actors with little expense can easily make calls. Which social engineer strategy is a telecommunications ONLY risk concept?
What is an important countermeasure to consider when hardening network devices and servers to reduce the effectiveness of unauthorized network scanning?
What is the MOST likely cause for a penetration tester having difficulties finding the stack to inject code?
What is the PRIMARY secure protocol used by a Content Delivery Network (CDN)?
| PDF + Testing Engine | 
|---|
| $57.75 | 
| Testing Engine | 
|---|
| $43.75 | 
| PDF (Q&A) | 
|---|
| $36.75 | 
| APICS Free Exams | 
|---|
|   |