Which of the following would be identified as physical …
During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company.
Which of the following would be identified as physical security controls? (Select THREE). circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. taken many forms, the most usual being like a large foothold trap, the steel springs being armed with teeth which met in the victim’s leg. to verify identity for secure access to electronic systems. Biometric authentication is a physical security device. offices, embassies, areas within financial institutions, research and development laboratories, and storage areas holding weapons, controlled substances, etc. Cipher locks are physical security devices.
Which of the following could the technician do for vend…
A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus.
Which of the following could the technician do for vendors to validate the proper security patch? data input (which may be a message of any length) that is claimed to be as unique to that specific data as afingerprint is to the specific individual.
Which of the following is the BEST security method to i…
A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There is a finite known number of approved handheld devices needing to access the store’s wireless network.
Which of the following is the BEST security method to implement on the access points?
Which of the following is the BEST way to accomplish this?
A company wants to make sure that users are required to authenticate prior to being allowed on the network.
Which of the following is the BEST way to accomplish this?
Which of the following should be implemented to reduce …
A company has seen an increase in ransomware across the enterprise.
Which of the following should be implemented to reduce the occurrences? ransom paid to the creator(s) of the malware in order for the restriction to be removed.
Which of the following will secure traffic between a we…
A technician needs to secure web traffic for a new e-commerce website.
Which of the following will secure traffic between a web browser and a website?
Which of the following should be implemented to securel…
A technician wants to securely manage several remote network devices.
Which of the following should be implemented to securely manage the devices? are addressed inSNMPv3.
Which of the following would need to be configured on e…
A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices.
Which of the following would need to be configured on each network device to provide that information in a secure manner? standard of network management protocols. The security weaknesses of SNMPv1 and SNMPv2c are addressed in SNMPv3.
Which of the following would be the result of a user ph…
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting? second MAC address is seen on the switchport the port will be shutdown and put into the err-disabled state.
Which of the following actions should the IT security t…
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers.
Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy? can then use that single computer to proceed further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside disgruntled employee.