Which of the following techniques would be BEST suited …
Ann, a network security engineer, is trying to harden her wireless network. Currently, users are able to connect any device to the wireless network as long as they
authenticate with their network username and password. She is concerned that devices that are not company-issued may gain unauthorized access. Which of the
following techniques would be BEST suited to remediate this vulnerability? (Select TWO).
Which of the following actions would help prevent SQL i…
Which of the following actions would help prevent SQL injection on a web application?
Which of the following authentication services utilizes…
Which of the following authentication services utilizes UDP for communication between client and server?
Which of the following types of activity is MOST accura…
A systems administrator is part of the organization’s contingency and business continuity planning process. The systems administrator and relevant team participant
in the analysis of a contingency situation intended to elicit constructive discussion. Which of the following types of activity is MOST accurately described in this
scenario?
The application is MOST likely using:
A security administrator, believing it to be a security risk, disables IGMP snooping on a switch. This breaks a video application. The application is MOST likely using:
Which of the following configurations were likely to ha…
An application service provider has notified customers of a breach resulting from improper configuration changes. In the incident, a server intended for internal
access only was made accessible to external parties. Which of the following configurations were likely to have been improperly modified, resulting in the breach?
Which of the following should the security administrato…
A healthcare organization is in the process of building and deploying a new web server in the DMZ that will enable public Internet users the ability to securely send
and receive messages from their primary care physicians. Which of the following should the security administrator consider?
which of the following?
A security specialist has implemented antivirus software and whitelisting controls to prevent malware and unauthorized application installation on the company
systems. The combination of these two technologies is an example of which of the following?
Which of the following MUST be taken into consideration?
An administrator needs to deploy a new SSL wildcard certificate to three different web servers. Which of the following MUST be taken into consideration? (Select
TWO).
which of the following steps immediately precedes the a…
An analyst is documenting the user interaction process associated with the login prompts in an application structure, the user enters a username and a one-time
password, which was previously emailed to the user. Next, the user enters a PIN and is then allowed into the dashboard of the application to modify account details.
In this scenario, which of the following steps immediately precedes the authorization process?