Which of the following steps of incident handling has been incorrectly performed?
A network technician was tasked to respond to a compromised workstation. The technician
documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of
the following steps of incident handling has been incorrectly performed?
Which of the following should be applied in order to achieve confidentiality and integrity of all data across
A new MPLS network link has been established between a company and its business partner.
The link provides logical isolation in order to prevent access from other business partners. Which
of the following should be applied in order to achieve confidentiality and integrity of all data across
the link?
Which of the following would be identified as physical security controls?
During a check of the security control measures of the company network assets, a network
administrator is explaining the difference between the security controls at the company. Which of
the following would be identified as physical security controls? (Select THREE).
Which of the following would be used as a secure substitute for Telnet?
Which of the following would be used as a secure substitute for Telnet?
Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which
ports need to be opened to allow remote access to the system. Which of the following should the
technician perform?
Which of the following protocols provides transport security for virtual terminal emulation?
Which of the following protocols provides transport security for virtual terminal emulation?
which of the following manners would meet the company’s objectives?
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the
DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the
10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners
would meet the company’s objectives?
Which of the following provide the BEST protection against brute forcing stored passwords?
A security engineer is asked by the company’s development team to recommend the most secure
method for password storage.
Which of the following provide the BEST protection against brute forcing stored passwords?
(Select TWO).
Which of the following attacks is the user MOST likely using?
A malicious user floods a switch with frames hoping to redirect traffic to the user’s server. Which of
the following attacks is the user MOST likely using?
Deploying a wildcard certificate is one strategy to:
Deploying a wildcard certificate is one strategy to:
