The marketing department contacts the web development team and states that they are receiving inconsistent
values in a newly launched form. Which of the following is MOST likely the problem?
A. Private browsing is being used by some clients visiting the site. B. Client-side scripting has been deactivated on some clients visiting the site. C. Legacy browsers that do not support scripting are being used by some clients. D. Server-side scripting has been deactivated by the server administrator.
A network has been infected with a worm. Which of the following would be the BEST security measures to
take? (Choose two.)
A. Update the IPS signatures. B. Update the network firewall. C. Update the malware definitions. D. Quarantine the network. E. Reset the network router. F. Contact the ISP.
A technician has worked through all steps of the troubleshooting methodology and has not been able to resolve
the issue. Which of the following should the technician do NEXT?
A. Escalate as necessary. B. Confirm the root cause. C. Establish a new theory. D. Gather information.
A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the
following would be the BEST option to improve the security of the network?
A. Change the SSID. B. Change the default password. C. Change to WEP security. D. Create a guest network.
A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of
the following best practices is MOST useful to meet this goal?
A. Input validation B. System updates C. Password lockout D. Login auditing
Which of the following types of network security deals with deviations from the historic connection patterns and
analysis of new threats to provide effective mitigation responses?
A. Behavior security B. Information Identity Management C. Unauthorized hacking D. Authorized hacking
All users have access to an application at a company. The data from the application is stored on a centralized
device located on the network. Which of the following devices would MOST likely be used to store the data?
A. Server B. Tape library C. External HDD D. Workstation
Correct Answer: A
Please disable your adblocker or whitelist this site!