Which of the following would BEST prevent unauthorized …
The Chief Security Officer (CSO) is concerned with unauthorized access at the company’s off-site datacenter. The CSO would like to enhance the security posture
of the datacenter. Which of the following would BEST prevent unauthorized individuals from gaining access to the datacenter?
Which of the following is MOST effective at cracking ha…
Which of the following is MOST effective at cracking hashed passwords?
Which of the following encryption solutions would meet …
An enterprise needs to be able to receive files that contain PII from many customers at different times. The data must remain encrypted during transport and while
at rest. Which of the following encryption solutions would meet both of these requirements?
Which of the following should the administrator impleme…
A company provides wireless access for employees and a guest wireless network for visitors. The employee wireless network is encrypted and requires a
password. The guest wireless network does not use an encrypted connection and does not require a password. An administrator walks by a visitor’s laptop and
notices the following command line output:
reaver – I mon – b 7a : E5 : 9A : 42 : 2C : C1 – vv
Starting…..
[+] Trying pin 12345678
[+] 93.41% complete @ 2015-01-10 10:30:21 (15 seconds)
[!] WARNING: 10 failed connections in a row
[+] Trying pin 12345688
…
Which of the following should the administrator implement and why?
Which of the following capabilities would be MOST suita…
A network has been impacted by downtime resulting from unauthorized devices connecting directly to the wired network. The network administrator has been
tasked to research and evaluate technical controls that would effectively mitigate risks associated with such devices. Which of the following capabilities would be
MOST suitable for implementation in this scenario?
Which of the following principles of effectiveness did …
An attacker is able to successfully execute a social engineering attack by entering a building while dressed as a building security guard. Which of the following
principles of effectiveness did the attacker utilize to execute the attack?
Which of the following ports should be blocked by the f…
A firewall administrator has been instructed to block common Microsoft file sharing ports due to a recent malware outbreak. Which of the following ports should be
blocked by the firewall? (Select TWO).
Which of the following can the technician use to verify…
A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a
system file was compromised? (Select TWO).
Which of the following is a critical security considera…
A company hosts sites for multiple vendors and provides information to users globally. Which of the following is a critical security consideration in this environment?
Which of the following should Joe enable on his worksta…
Joe, a user, wants to configure his work station to make certain that the certificate he receives when connecting to websites is still valid. Which of the following
should Joe enable on his workstation to achieve this?