Which of the following is the BEST tool to use?
A security administrator wants to check user password complexity. Which of the following is the
BEST tool to use?
Which of the following would be used to stop unauthorized access?
At an organization, unauthorized users have been accessing network resources via unused
network wall jacks. Which of the following would be used to stop unauthorized access?
Certificates are used for: (Select TWO).
Certificates are used for: (Select TWO).
Which of the following is a hardware based encryption device?
Which of the following is a hardware based encryption device?
Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician
checks the router access list and sees that web, email, and secure shell are allowed. Which of the
following is blocking network printing?
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following should Joe search for in the log files?
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a
result of a misconfigured router access list, allowing outside access to an SSH server. Which of
the following should Joe search for in the log files?
Which of the following MOST interferes with network-based detection techniques?
Which of the following MOST interferes with network-based detection techniques?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI
model?
which of the following actions in PKI?
A certificate authority takes which of the following actions in PKI?