PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following is used to authenticate remote w…

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO). are commonly used by ISP’s to authenticate their customer’s Internet connections. authentication requests to the central RADIUS server. mechanism to devices wishing to attach to a network. supplicant is a client that wishes to attach to the network. The authenticator is a network device, such as an the RADIUS server.

Which of the following network devices use ACLs to prev…

Which of the following network devices use ACLs to prevent unauthorized access into company systems? frequently used to prevent unauthorized Internet users from accessing private networks connected to the through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL

Which of the following options would satisfy these requ…

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other.
Which of the following options would satisfy these requirements? network segments called VLANs. they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic. connection between the systems. We can use a network router to route between the VLANs or we can use a the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Which of the following should be done FIRST to prevent …

The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files:
Locky.js xerty.ini xerty.lib
Further analysis indicates that when the .zip file is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company NAS from being encrypted by infected devices?

Which of the following combinations suggests how the th…

A threat intelligence analyst who works for a technology firm received this report from a vendor.
“There has been an intellectual property theft campaign executed against organizations in the technology industry. Indicators for this activity are unique to each intrusion. The information that appears to be targeted is
R&D data. The data exfiltration appears to occur over months via uniform TTPs. Please execute a defensive operation regarding this attack vector.”
Which of the following combinations suggests how the threat should MOST likely be classified and the type of analysis that would be MOST helpful in protecting against this activity?


Page 270 of 461« First...102030...268269270271272...280290300...Last »