Which of the following BEST describes the term war driving?
Which of the following BEST describes the term war driving?
When is the BEST time to update antivirus definitions?
When is the BEST time to update antivirus definitions?
Why would a technician use a password cracker?
Why would a technician use a password cracker?
When should a technician perform penetration testing?
When should a technician perform penetration testing?
Which of the following is the MOST secure alternative for administrative access to a router?
Which of the following is the MOST secure alternative for administrative access to a router?
Which of the following mitigation techniques would address this concern?
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).
Which of the following does the technician need to do?
A technician is testing the security of a new database application with a website front-end. The technician notices that when certain characters are input into the application it will crash the server. Which of the following does the technician need to do?
Which of the following devices provides storage for RSA or asymmetric keys and may assist in user authenticati
Which of the following devices provides storage for RSA or asymmetric keys and may assist in user authentication? (Select TWO).
Which of the following solutions would allow the small company to save money on hiring additional personnel an
A small company needs to invest in a new expensive database. The company’s budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional personnel and minimize the footprint in their current datacenter?
Which of the following protocols should be used for the tunnel?
A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?