Which of the following should the technician do to gather information about the configuration of the wireless
A security technician is attempting to access a wireless network protected with WEP. The
technician does not know any information about the network. Which of the following should the
technician do to gather information about the configuration of the wireless network?
Which of the following systems should be used?
After a recent breach, the security technician decides the company needs to analyze and aggregate
its security logs. Which of the following systems should be used?
Which of the following actions should be taken to correct this?
The IT department has installed new wireless access points but discovers that the signal extends
far into the parking lot. Which of the following actions should be taken to correct this?
Which of the following should be used to prevent issues in the future?
A network technician is diligent about maintaining all system servers’ at the most current service
pack level available. After performing upgrades, users experience issues with server-based
applications. Which of the following should be used to prevent issues in the future?
Which of the following would BEST address this?
Joe, the systems administrator, is setting up a wireless network for his team’s laptops only and
needs to prevent other employees from accessing it. Which of the following would BEST address
this?
Which of the following would be required to resolve the exploit?
A company has implemented the capability to send all log files to a central location by utilizing an
encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has
caused the company’s encryption to become unsecure. Which of the following would be required to
resolve the exploit?
Which of the following provides the strongest authentication security on a wireless network?
Which of the following provides the strongest authentication security on a wireless network?
Which of the following will be needed after the server has been rebuilt and joined to the domain?
The RAID controller on a server failed and was replaced with a different brand. Which of the
following will be needed after the server has been rebuilt and joined to the domain?
Which of the following is a concern when encrypting wireless data with WEP?
Which of the following is a concern when encrypting wireless data with WEP?
Which of the following would be the appropriate wireless technology for this design?
A network technician has been tasked with designing a WLAN for a small office. One of the
requirements of this design is that it is capable of supporting HD video streaming to multiple devices.
Which of the following would be the appropriate wireless technology for this design?