1. Datacenter access is controlled with proximity badges that record all entries and exits from the datacenter.The access records are used to identify which staff members accessed the data center in the event of equipment theft.Which of the following MUST be prevented in order for this policy to be effective?
A) Password reuse
B) Social engineering
C) Phishing
D) Tailgating
2. A technician receives a report that a users workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running theback of the users VoIP phone is routed directly under the rolling chair and has been smashed flat over time.Which of the following is the most likely cause of this issue?
A) Excessive collisions
B) Cross-talk
C) Split pairs
D) Electromagnetic interference
3. A security analyst wants to scan the network for active hosts. Which of the following host characteristics help to differentiate between a virtual and physical host?
A) DNS routing tables
B) Host IPs
C) Gateway settings
D) Reserved MACs
4. A security analyst has just completed a vulnerability scan of servers that support a business critical application that is managed by an outside vendor. The results ofthe scan indicate the devices are missing critical patches. Which of the following factors can inhibit remediation of these vulnerabilities? (Choose two.)(Select 2answers)
A) Incomplete asset inventory
B) Business process interruption
C) Required sandbox testing
D) SLAs with the supporting vendor
E) Inappropriate data classifications
5. A security analyst at a small regional bank has received an alert that nation states are attempting to infiltrate financial institutions via phishing campaigns. Which ofthe following techniques should the analyst recommend as a proactive measure to defend against this type of threat?
A) Mandatory access control
B) Honeypot
C) Bastion host
D) System isolation
E) Location-based NAC