Which of the following is the BEST security method to implement on the access points?
A wireless network technician for a local retail store is installing encrypted access points within the
store for real-time inventory verification, as well as remote price checking capabilities, while
employees are away from the registers. The store is in a fully occupied strip mall that has multiple
neighbors allowing guest access to the wireless networks. There are a finite known number of
approved handheld devices needing to access the store’s wireless network. Which of the following is
the BEST security method to implement on the access points?
Which of the following protocols is the security administrator observing in this packet capture?
Which of the following protocols is the security administrator observing in this packet capture?
12:33:43, SRC 192.168.4.3:3389, DST 10.67.33.20:8080, SYN/ACK
Which of the following forensics actions should Ann perform?
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep
within the directory structure. To ensure the virus has not infected the .mp4 files in the directory,
she views one of the files and believes it contains illegal material. Which of the following forensics
actions should Ann perform?
Which of the following cryptographic related browser settings allows an organization to communicate securely?
Which of the following cryptographic related browser settings allows an organization to
communicate securely?
Which of the following describes a smurf attack?
Which of the following describes a smurf attack?
Which of the following algorithms with transport encryption would be implemented to provide the MOST secure we
Recent data loss on financial servers due to security breaches forced the system administrator to
harden their systems. Which of the following algorithms with transport encryption would be
implemented to provide the MOST secure web connections to manage and access these servers?
Which of the following technologies is designed to keep systems uptime running in the event of a disaster?
Which of the following technologies is designed to keep systems uptime running in the event of a
disaster?
Which of the following may be used to meet this objective?
A security administrator has been tasked with setting up a new internal wireless network that must
use end to end TLS. Which of the following may be used to meet this objective?
Which of the following is the BEST explanation that describes this scenario?
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any
response from the server. Which of the following is the BEST explanation that describes this
scenario?
Which of the following protocols encapsulates an IP packet with an additional IP header?
Which of the following protocols encapsulates an IP packet with an additional IP header?