Which of the following would be configured to provide these reports?
A network administrator needs to provide daily network usage reports on all layer 3 devices
without compromising any data while gathering the information. Which of the following would be
configured to provide these reports?
which of the following risk mitigation strategies?
A security administrator has been tasked to ensure access to all network equipment is controlled
by a central server such as TACACS+. This type of implementation supports which of the following
risk mitigation strategies?
Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security
gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the
tethered connection and corporate data is stolen. Which of the following would BEST prevent this
from occurring again?
which of the following should be used to decrypt data at company B?
Company A sends a PGP encrypted file to company B. If company A used company B’s public key
to encrypt the file, which of the following should be used to decrypt data at company B?
Which of the following can be implemented if a security administrator wants only certain devices connecting to
Which of the following can be implemented if a security administrator wants only certain devices
connecting to the wireless network?
Which of the following types of authentication solutions use tickets to provide access to various resources fr
Which of the following types of authentication solutions use tickets to provide access to various
resources from a central location?
Which of the following malware types typically allows an attacker to monitor a user’s computer, is character
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
Which of the following would offer the ability to expand while keeping their current data center operated by i
A corporation is looking to expand their data center but has run out of physical space in which to
store hardware. Which of the following would offer the ability to expand while keeping their current
data center operated by internal staff?
Which of the following has the attacker created?
After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following has the attacker created?
Which of the following malware types may require user interaction, does not hide itself, and is commonly ident
Which of the following malware types may require user interaction, does not hide itself, and is
commonly identified by marketing pop-ups based on browsing habits?