Matt, the security administrator, wants to secure the wireless network. Which of the following encryption methods offers the MOST security?
A. WPA2...
Jane, the security administrator, is having issues with unauthorized users connecting to the wireless network. For administrative reasons, she cannot implement any wireless encryption methods. Which of the following can she implement to prevent unauthorized users from connecting to the network?
Jane, the security administrator, is having issues with unauthorized users connecting to the wireless network. For administrative reasons, she cannot...
Which of the following can be implemented with multiple bit strength?
Which of the following can be implemented with multiple bit strength?
A. AES
B. DES
C. SHA-1
D. MD5
E. MD4
Answer: ...
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting...
Pete's corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent?
Pete's corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving...
The compliance team comes out with a new policy that all data stored on tapes over 3 years must be degaussed. This BEST describes which of the following types of policies?
The compliance team comes out with a new policy that all data stored on tapes over 3 years must be degaussed. This BEST describes which of the following...
The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following?
The information security team does a presentation on social media and advises the participants not to provide too much personal information on social...
An encryption method where the plain text and cipher text are always the same size is an example of which of the following types of encryption?
An encryption method where the plain text and cipher text are always the same size is an example of which of the following types of encryption?
A....
Which of the following can allow Sara, a security analyst, to encrypt individual files on a system?
Which of the following can allow Sara, a security analyst, to encrypt individual files on a system?
A. EFS
B. Single sign-on
C. TLS
D. Journaled...
Which of the following is the LEAST volatile when performing incident response procedures?
Which of the following is the LEAST volatile when performing incident response procedures?
A. Registers
B. RAID cache
C. RAM
D. Hard drive
Answer:...
Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent?
Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent?
A....
Which of the following encompasses application patch management?
Which of the following encompasses application patch management?
A. Configuration management
B. Policy management
C. Cross-site request forgery
D....
Which of the following presents the STRONGEST access control?
Which of the following presents the STRONGEST access control?
A. MAC
B. TACACS
C. DAC
D. RBAC
Answer: ...
Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning?
Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports...
Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company's password policy. Which of the following should Pete do NEXT?
Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company's password...
Which of the following does full disk encryption prevent?
Which of the following does full disk encryption prevent?
A. Client side attacks
B. Clear text access
C. Database theft
D. Network-based attacks
Answer:...
Which of the following is MOST closely associated with BitLocker?
Which of the following is MOST closely associated with BitLocker?
A. ACL
B. DOS
C. DLP
D. TPM
Answer: ...
Which of the following types of encryption will help in protecting files on a PED?
Which of the following types of encryption will help in protecting files on a PED?
A. Mobile device encryption
B. Transport layer encryption
C....
Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this requirement?
Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this...
Which of the following technologies prevents USB drives from being recognized by company systems?
Which of the following technologies prevents USB drives from being recognized by company systems?
A. Registry keys
B. Full disk encryption
C....
Which of the following technologies can store multi-tenant data with different security requirements?
Which of the following technologies can store multi-tenant data with different security requirements?
A. Data loss prevention
B. Trusted platform...
Which of the following BEST explains the use of an HSM within the company servers?
Which of the following BEST explains the use of an HSM within the company servers?
A. Thumb drives present a significant threat which is mitigated...
Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems to be most interested in are botnets and viruses. Which of the following explains the difference between these two types of malware?
Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems...
Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems to be most interested in are backdoors and logic bombs. Which of the following differentiates these two types of malware?
Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems...
Which of the following firewall rules would only block tftp traffic and record it?
Which of the following firewall rules would only block tftp traffic and record it?
A. deny udp any server log
B. deny udp any server eq 69
C. deny...
Matt works for an organization that requires data to be recovered in the shortest amount of time possible. Which of the following backup types would BEST meet the organization's needs?
Matt works for an organization that requires data to be recovered in the shortest amount of time possible. Which of the following backup types would...
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?
A....
Sara, a security technician, has been asked to design a solution which will enable external users to have access to a Web server, while keeping the internal network unaffected by this access. Which of the following would BEST meet this objective?
Sara, a security technician, has been asked to design a solution which will enable external users to have access to a Web server, while keeping the...
Matt must come up with a design solution which will enable remote users to securely access network resources. Which of the following design elements will enable Matt to meet this objective?
Matt must come up with a design solution which will enable remote users to securely access network resources. Which of the following design elements...
Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?
Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains...
Pete, a security administrator, has implemented SSH across all network infrastructure devices in the enterprise. Which of the following protocols will be used to exchange keying material within SSH?
Pete, a security administrator, has implemented SSH across all network infrastructure devices in the enterprise. Which of the following protocols will...
After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service?
After a production outage, which of the following documents contains detailed information on the order in which the system should be restored to service?
A....
Jane, a security administrator, is reviewing the company's official documentation to mitigate the risk of data loss due to personally owned devices being connected to perform company related work. Which of the following documentation should Jane MOST likely review and update?
Jane, a security administrator, is reviewing the company's official documentation to mitigate the risk of data loss due to personally owned devices...
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to...
Pete, the system administrator, wishes to monitor and limit users' access to external websites. Which of the following would BEST address this?
Pete, the system administrator, wishes to monitor and limit users' access to external websites. Which of the following would BEST address this?
A....
Jane, the CEO, receives an email wanting her to clink on a link to change her username and password. Which of the following attacks has she just received?
Jane, the CEO, receives an email wanting her to clink on a link to change her username and password. Which of the following attacks has she just received?
A....
Which of the following can be used to discover if a security attack is occurring on a web server?
Which of the following can be used to discover if a security attack is occurring on a web server?
A. Creating a new baseline
B. Disable unused accounts
C....
Jane, the security engineer, is tasked with hardening routers. She would like to ensure that network access to the corporate router is allowed only to the IT group and from authorized machines. Which of the following would MOST likely be implemented to meet this security goal? (Select TWO).
Jane, the security engineer, is tasked with hardening routers. She would like to ensure that network access to the corporate router is allowed only...
The lobby of the hotel allows users to plug in their laptops to access the Internet. This network is also used for the IP based phones in the hotel lobby. Mike, the security engineer, wants to secure the phones so that guests cannot electronically eavesdrop on other guests. Which of the following would Mike MOST likely implement?
The lobby of the hotel allows users to plug in their laptops to access the Internet. This network is also used for the IP based phones in the hotel...
The information security department regularly walks the campus and around the buildings looking for unauthorized open wireless networks. This is an example of which of the following?
The information security department regularly walks the campus and around the buildings looking for unauthorized open wireless networks. This is an...
Jane, a security architect, is implementing security controls throughout her organization. Which of the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x Impact?
Jane, a security architect, is implementing security controls throughout her organization. Which of the following BEST explains the vulnerability in...
Sara, a security administrator, has been tasked with explaining smart cards to the company's management team. Which of the following are smart cards? (Select TWO).
Sara, a security administrator, has been tasked with explaining smart cards to the company's management team. Which of the following are smart cards?...
A security technician is working with the network firewall team to implement access controls at the company's demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls at the company's demarc as part of the initiation of configuration...
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
A. A buffer zone between protected and unprotected networks.
B. A network where all servers...
Which of the following would ensure confidentiality and authorization to the management interface of a router?
Which of the following would ensure confidentiality and authorization to the management interface of a router?
A. Enable an access list and RADIUS
B....
Matt, an account manager, arrives at work early in the morning and cannot log into his workstation. He calls the help desk an hour later to open a trouble ticket, but they tell him there is nothing wrong with his account. Matt tries his login once more and is granted access. Which of the following control types BEST explains this anomaly?
Matt, an account manager, arrives at work early in the morning and cannot log into his workstation. He calls the help desk an hour later to open a trouble...
A company is experiencing an extraordinary amount of web traffic that is crippling the server. The web traffic suddenly stops. The mail server experiences the same amount of traffic as before then crashes. Which of the following attacks would this BEST describe?
A company is experiencing an extraordinary amount of web traffic that is crippling the server. The web traffic suddenly stops. The mail server experiences...
A database server containing personal information and a file server containing non-critical information must be secured. Which of the following would be a BEST practice to secure the servers? (Select TWO).
A database server containing personal information and a file server containing non-critical information must be secured. Which of the following would...
Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?
Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which...
While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?
While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down....
Which of the following uses only a private key?
Which of the following uses only a private key?
A. RSA
B. ECC
C. AES
D. SHA
Answer: ...
A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?
A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator...
Which of the following fire suppression systems is MOST likely used in a datacenter?
Which of the following fire suppression systems is MOST likely used in a datacenter?
A. FM-200
B. Dry-pipe
C. Wet-pipe
D. Vacuum
Answer:...
Pete has obtained a highly sensitive document and has placed it on a network drive which has been formatted with NTFS and is shared via CIFS. Which of the following access controls apply to the sensitive file on the server?
Pete has obtained a highly sensitive document and has placed it on a network drive which has been formatted with NTFS and is shared via CIFS. Which...
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure?
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the...
Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment?
Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss...
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?
A....
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?
A. Input validation
B. Network...
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?
A. DIAMETER
B. RADIUS
C....
A company has asked Pete, a penetration tester, to test their corporate network. Pete was provided with all of the server names, configurations, and corporate IP addresses. Pete was then instructed to stay off of the Accounting subnet as well as the company web server in the DMZ. Pete was told that social engineering was not in the test scope as well. Which of the following BEST describes this penetration test?
A company has asked Pete, a penetration tester, to test their corporate network. Pete was provided with all of the server names, configurations, and...
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk?
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party...
Which of the following is used to ensure message integrity during a TLS transmission?
Which of the following is used to ensure message integrity during a TLS transmission?
A. RIPEMD
B. RSA
C. AES
D. HMAC
Answer: ...
Which of the following BEST describes the weakness in WEP encryption?
Which of the following BEST describes the weakness in WEP encryption?
A. The initialization vector of WEP uses a crack-able RC4 encryption algorithm....
Which of the following is the MOST specific plan for various problems that can arise within a system?
Which of the following is the MOST specific plan for various problems that can arise within a system?
A. Business Continuity Plan
B. Continuity...
Jane, an IT security technician, receives a call from the vulnerability assessment team informing her that port 1337 is open on a user's workstation. Which of the following BEST describes this type of malware?
Jane, an IT security technician, receives a call from the vulnerability assessment team informing her that port 1337 is open on a user's workstation....
Matt, an IT security technician, needs to create a way to recover lost or stolen company devices. Which of the following BEST meets this need?
Matt, an IT security technician, needs to create a way to recover lost or stolen company devices. Which of the following BEST meets this need?
A....
Which of the following is an application security coding problem?
Which of the following is an application security coding problem?
A. Error and exception handling
B. Patch management
C. Application hardening
D....
Sara, an IT security technician, has identified security weaknesses within her company's code. Which of the following is a common security coding issue?
Sara, an IT security technician, has identified security weaknesses within her company's code. Which of the following is a common security coding issue?
A....
During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).
During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully...
Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?
A. MyTrain!45
B. Mytr@in!!
C. MyTr@in12
D. MyTr@in#8
Answer: ...
Jane, a security administrator, notices that a program has crashed. Which of the following logs should Jane check?
Jane, a security administrator, notices that a program has crashed. Which of the following logs should Jane check?
A. Access log
B. Firewall log
C....
Sara, a security administrator, is configuring a new firewall. She has entered statements into the firewall configuration as follows:
Sara, a security administrator, is configuring a new firewall. She has entered statements into the firewall configuration as follows:
Allow all Web...
Which of the following protocols allows for secure transfer of files? (Select TWO).
Which of the following protocols allows for secure transfer of files? (Select TWO).
A. ICMP
B. SNMP
C. SFTP
D. SCP
E. TFTP
Answer: ...
Sara, the Chief Executive Officer (CEO) of a corporation, wishes to receive her corporate email and file attachments on her corporate mobile computing device. If the device is lost or stolen, the BEST security measure to ensure that sensitive information is not comprised would be:
Sara, the Chief Executive Officer (CEO) of a corporation, wishes to receive her corporate email and file attachments on her corporate mobile computing...
Which of the following BEST describes a directory traversal attack?
Which of the following BEST describes a directory traversal attack?
A. A malicious user can insert a known pattern of symbols in a URL to access...
Jane, a security analyst, wants to ensure that data is being stored encrypted, in the event that a corporate laptop is stolen. Which of the following encryption types will accomplish her goal?
Jane, a security analyst, wants to ensure that data is being stored encrypted, in the event that a corporate laptop is stolen. Which of the following...
Sara, a senior programmer for an application at a software development company, has also assumed an auditing role within the same company. She will be assessing the security of the application. Which of the following will she be performing?
Sara, a senior programmer for an application at a software development company, has also assumed an auditing role within the same company. She will...
Sara, a security administrator, needs to implement the equivalent of a DMZ at the datacenter entrance. Which of the following must she implement?
Sara, a security administrator, needs to implement the equivalent of a DMZ at the datacenter entrance. Which of the following must she implement?
A....
Which of the following can be implemented on a lost mobile device to help recover it?
Which of the following can be implemented on a lost mobile device to help recover it?
A. Remote sanitization
B. GPS tracking
C. Voice encryption
D....
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).
A. Tethering
B....
Which of the following is true concerning WEP security?
Which of the following is true concerning WEP security?
A. WEP keys are transmitted in plain text.
B. The WEP key initialization process is flawed.
C....
Which of the following is an authentication service that uses UDP as a transport medium?
Which of the following is an authentication service that uses UDP as a transport medium?
A. TACACS+
B. LDAP
C. Kerberos
D. RADIUS
Answer:...
A buffer overflow can result in which of the following attack types?
A buffer overflow can result in which of the following attack types?
A. DNS poisoning
B. Zero-day
C. Privilege escalation
D. ARP poisoning
Answer:...
Sara from IT Governance wants to provide a mathematical probability of an earthquake using facts and figures. Which of the following concepts would achieve this?
Sara from IT Governance wants to provide a mathematical probability of an earthquake using facts and figures. Which of the following concepts would...
Which of the following does a second authentication requirement mitigate when accessing privileged areas of a website, such as password changes or user profile changes?
Which of the following does a second authentication requirement mitigate when accessing privileged areas of a website, such as password changes or user...
Which of the following application attacks is used to gain access to SEH?
Which of the following application attacks is used to gain access to SEH?
A. Cookie stealing
B. Buffer overflow
C. Directory traversal
D. XML injection
Answer:...
In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him understand what traffic patterns are normal on his network. Which of the following tools would help Pete determine traffic patterns?
In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him understand what traffic patterns are normal on his...
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
A. impersonation.
B. tailgating.
C. dumpster diving.
D....
Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address?
Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address?
A....
Which of the following sets numerous flag fields in a TCP packet?
Which of the following sets numerous flag fields in a TCP packet?
A. XMAS
B. DNS poisoning
C. SYN flood
D. ARP poisoning
Answer: ...
Which of the following technologies would allow for a secure tunneled connection from one site to another? (Select TWO).
Which of the following technologies would allow for a secure tunneled connection from one site to another? (Select TWO).
A. SFTP
B. IPSec
C. SSH
D....
Mike, a security analyst, has captured a packet with the following payload.
Mike, a security analyst, has captured a packet with the following payload.
GET ../../../../system32\/cmd.exe
Which of the following is this an example...
Which of the following must Jane, a security administrator, implement to ensure all wired ports are authenticated before a user is allowed onto the network?
Which of the following must Jane, a security administrator, implement to ensure all wired ports are authenticated before a user is allowed onto the...
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following...
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?
A. Restoration and recovery...
Which of the following incident response procedures BEST allows Sara, the security technician, to identify who had possession of a hard drive prior to forensics analysis?
Which of the following incident response procedures BEST allows Sara, the security technician, to identify who had possession of a hard drive prior...
Which of the following is a management control?
Which of the following is a management control?
A. Logon banners
B. Written security policy
C. SYN attack prevention
D. Access Control List (ACL)
Answer:...
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
A. Implement WPA
B. Disable SSID
C....
Which of the following protocols can be used to secure traffic for telecommuters?
Which of the following protocols can be used to secure traffic for telecommuters?
A. WPA
B. IPSec
C. ICMP
D. SMTP
Answer: ...
Mike, a user, receives an email from his grandmother stating that she is in another country and needs money. The email address belongs to his grandmother. Which of the following attacks is this?
Mike, a user, receives an email from his grandmother stating that she is in another country and needs money. The email address belongs to his grandmother....
Pete, the security administrator, wants to ensure that traffic to the corporate intranet is secure using HTTPS. He configures the firewall to deny traffic to port 80. Now users cannot connect to the intranet even through HTTPS. Which of the following is MOST likely causing the issue?
Pete, the security administrator, wants to ensure that traffic to the corporate intranet is secure using HTTPS. He configures the firewall to deny traffic...
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?
A. Identify user habits
B....
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A....
A company had decided to assign employees laptops instead of desktops to mitigate the risk of company closures due to disasters. Which of the following is the company trying to ensure?
A company had decided to assign employees laptops instead of desktops to mitigate the risk of company closures due to disasters. Which of the following...
When employees that use certificates leave the company they should be added to which of the following?
When employees that use certificates leave the company they should be added to which of the following?
A. PKI
B. CA
C. CRL
D. TKIP
Answer:...
Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? (Select TWO).
Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should...
Enforcing data encryption of removable media ensures that the:
Enforcing data encryption of removable media ensures that the:
A. lost media cannot easily be compromised.
B. media can be identified.
C. location...
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
A. Man-in-the-middle
B. Bluejacking
C....
Which of the following are used to implement VPNs? (Select TWO).
Which of the following are used to implement VPNs? (Select TWO).
A. SFTP
B. IPSec
C. HTTPS
D. SNMP
E. SSL
Answer: B & ...
Jane, an administrator, hears reports of circles being drawn in the parking lot. Because the symbols fall within range of the company's wireless AP, the MOST likely concern is:
Jane, an administrator, hears reports of circles being drawn in the parking lot. Because the symbols fall within range of the company's wireless AP,...
While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?
While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?
A. EAP-TLS
B. PEAP
C....
Which of the following security concepts are used for data classification and labeling to protect data? (Select TWO)
Which of the following security concepts are used for data classification and labeling to protect data? (Select TWO)
A. Need to know
B. Role based...
Which of the following devices can Sara, an administrator, implement to detect and stop known attacks?
Which of the following devices can Sara, an administrator, implement to detect and stop known attacks?
A. Signature-based NIDS
B. Anomaly-based...
Subscribe to:
Posts (Atom)