Which of the following is the BEST way to run the malware scanner?
A Windows-based computer is infected with malware and is running too slowly to boot and run a
malware scanner. Which of the following is the BEST way to run the malware scanner?
Which of the following should the administrator configure to redirect traffic…?
A company administrator has a firewall with an outside interface connected to the Internet and an
inside interface connected to the corporate network. Which of the following should the
administrator configure to redirect traffic destined for the default HTTP port on the outside
interface to an internal server listening on port 8080?
Which of the following management controls should be introduced to the branch office to improve their state of
An overseas branch office within a company has many more technical and non-technical security
incidents than other parts of the company. Which of the following management controls should be
introduced to the branch office to improve their state of security?
Which of the following is a directional antenna that can be used in point-to-point or point-to-multipoint WiFi
Which of the following is a directional antenna that can be used in point-to-point or point-to-multipoint WiFi communication systems? (Select TWO).
Which of the following would be MOST appropriate to secure an existing SCADA system by preventing connections
Which of the following would be MOST appropriate to secure an existing SCADA system by
preventing connections from unauthorized networks?
The common method of breaking larger network address space into smaller networks is known as:
The common method of breaking larger network address space into smaller networks is known as:
Which of the following ports MUST be configured to allow active FTP connections?
While securing a network it is decided to allow active FTP connections into the network. Which of
the following ports MUST be configured to allow active FTP connections? (Select TWO).
Which of the following solutions should be implemented?
An administrator needs to secure a wireless network and restrict access based on the hardware
address of the device. Which of the following solutions should be implemented?
Which of the following is the MOST secure ACL to implement at the company’s gateway firewall?
A security administrator must implement a firewall rule to allow remote employees to VPN onto the
company network. The VPN concentrator implements SSL VPN over the standard HTTPS port.
Which of the following is the MOST secure ACL to implement at the company’s gateway firewall?
which of the following?
It is MOST important to make sure that the firewall is configured to do which of the following?