Which of the following should Ann do to retrieve her email messages?
Ann is traveling for business and is attempting to use the hotel’s wireless network to check for new
messages. She selects the hotel’s wireless SSID from a list of networks and successfully
connects. After opening her email client and waiting a few minutes, the connection times out.
Which of the following should Ann do to retrieve her email messages?
Which of the following password attacks involves attempting all kinds of keystroke combinations on the keyboar
Which of the following password attacks involves attempting all kinds of keystroke combinations
on the keyboard with the intention to gain administrative access?
Which of the following should Ann recommend that would BEST address her concerns?
Ann, a security administrator, is strengthening the security controls of the company’s campus. Her
goal is to prevent people from accessing open locations that are not supervised, such as around
the receiving dock. She is also concerned that employees are using these entry points as a way of
bypassing the security guard at the main entrance. Which of the following should Ann recommend
that would BEST address her concerns?
Which of the following is MOST likely being used?
While an Internet café a malicious user is causing all surrounding wireless connected devices to
have intermittent and unstable connections to the access point. Which of the following is MOST
likely being used?
Which of the following is the BEST technical control that could be implemented to reduce the amount of easily
A password audit has revealed that a significant percentage if end-users have passwords that are
easily cracked. Which of the following is the BEST technical control that could be implemented to
reduce the amount of easily “crackable” passwords in use?
Which of the following is the MOST secure combination to implement to meet this goal?
While working on a new project a security administrator wants to verify the integrity of the data in
the organizations archive library. Which of the following is the MOST secure combination to
implement to meet this goal? (Select TWO)
Which of the following should be performed after the server has been restored?
A company has been attacked and their website has been altered to display false information. The
security administrator disables the web server service before restoring the website from backup.
An audit was performed on the server and no other data was altered. Which of the following
should be performed after the server has been restored?
Which of the following tools could BEST be used to determine how the employee is connecting to the reverse pro
A security administrator suspects that an employee in the IT department is utilizing a reverse
proxy to bypass the company’s content filter and browse unapproved and non-work related sites
while at work. Which of the following tools could BEST be used to determine how the employee is
connecting to the reverse proxy?
Which of the following protocols should he secure?
Joe, a company’s network engineer, is concerned that protocols operating at the application layer
of the OSI model are vulnerable to exploitation on the network. Which of the following protocols
should he secure?
Which of the following is preventing the users from accessing the SSH server?
Ann a security technician receives a report from a user that is unable to access an offsite SSN
server. Ann checks the firewall and sees the following rules:
Allow TCP 80
Allow TCP 443
Deny TCP 23
Deny TCP 20
Deny TCP 21
Which of the following is preventing the users from accessing the SSH server?