Which of the following allows a company to maintain access to encrypted resources when employee turnover is hi
Which of the following allows a company to maintain access to encrypted resources when
employee turnover is high?
which of the following controls should be used?
A security team has identified that the wireless signal is broadcasting into the parking lot. To
reduce the risk of an attack against the wireless network from the parking lot, which of the
following controls should be used? (Select TWO).
Which of the following devices will help prevent a laptop from being removed from a certain location?
Which of the following devices will help prevent a laptop from being removed from a certain
location?
Which of the following methods would BEST accomplish this goal?
An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to integrate the security controls of some of the network devices in the
organization. Which of the following methods would BEST accomplish this goal?
Which of the following is the MOST secure protocol to transfer files?
Which of the following is the MOST secure protocol to transfer files?
Which of the following would allow the organization to divide a Class C IP address range into several ranges?
Which of the following would allow the organization to divide a Class C IP address range into
several ranges?
Which of the following security devices needs to be configured to disable future false alarms?
Suspicious traffic without a specific signature was detected. Under further investigation, it was
determined that these were false indicators. Which of the following security devices needs to be
configured to disable future false alarms?
Which of the following administrative controls should be implemented to BEST achieve this?
A company storing data on a secure server wants to ensure it is legally able to dismiss and
prosecute staff who intentionally access the server via Telnet and illegally tamper with customer
data. Which of the following administrative controls should be implemented to BEST achieve this?
Which of the following protocols could be used to secure communication by offering encryption at a lower OSI l
A company’s legacy server requires administration using Telnet. Which of the following protocols
could be used to secure communication by offering encryption at a lower OSI layer? (Select
TWO).
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following protocols is used to authenticate the client and server’s digital certificate?