Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following is a security benefit gained from setting up a guest wireless network?
which of the following actions in PKI?
A certificate authority takes which of the following actions in PKI?
Which of the following should be implemented to reduce the occurrences?
A company has seen an increase in ransomware across the enterprise. Which of the following should
be implemented to reduce the occurrences?
Which of the following is used to certify intermediate authorities in a large PKI deployment?
Which of the following is used to certify intermediate authorities in a large PKI deployment?
which of the following?
Before logging into the company network, users are required to sign a document that is to be stored
in their personnel file. This standards and policies document is usually called which of the following?
Which of the following components MUST be trusted by all parties in PKI?
Which of the following components MUST be trusted by all parties in PKI?
Which of the following could the technician do for vendors to validate the proper security patch?
A network technician has set up an FTP server for the company to distribute software updates for
their products. Each vendor is provided with a unique username and password for security. Several
vendors have discovered a virus in one of the security updates. The company tested all files before
uploading them but retested the file and found the virus. Which of the following could the
technician do for vendors to validate the proper security patch?
Which is the following is MOST likely the issue?
Company employees are required to have workstation client certificates to access a bank website.
These certificates were backed up as a precautionary step before the new computer upgrade.
After the upgrade and restoration, users state they can access the bank’s website, but not login.
Which is the following is MOST likely the issue?
Which of the following should be implemented to securely manage the devices?
A technician wants to securely manage several remote network devices. Which of the following
should be implemented to securely manage the devices?
Which of the following is the FIRST step the security administrator should take?
A company’s security administrator wants to manage PKI for internal systems to help reduce
costs. Which of the following is the FIRST step the security administrator should take?