which of the following should be implemented?
A cyber security administrator receives a list of IPs that have been reported as attempting to
access the network. To identify any possible successful attempts across the enterprise, which of
the following should be implemented?
Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS server in o
Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS
server in order to carry out URL redirection?
Which of the following choices BEST meets her intent of security and access?
Ann a new small business owner decides to implement WiFi access for her customers. There are
several other businesses nearby who also have WiFi hot spots. Ann is concerned about security of
the wireless network and wants to ensure that only her customers have access. Which of the
following choices BEST meets her intent of security and access?
Which of the following technologies provide the MOST complete protection?
A security engineer is tasked with encrypting corporate email. Which of the following technologies
provide the MOST complete protection? (Select TWO)
Which of the following is the GREATEST security concern of allowing employees to bring in their personally own
Which of the following is the GREATEST security concern of allowing employees to bring in their
personally owned tablets and connecting to the corporate network?
which of the following phases of incident response?
Searching for systems infected with malware is considered to be which of the following phases of
incident response?
Which of the following services could be run on the VPN concentrator to perform this authentication?
A technician has deployed a new VPN concentrator. The device needs to authenticate users
based on a backend directory service. Which of the following services could be run on the VPN
concentrator to perform this authentication?
Which of the following can BEST reduce the likelihood of this incident occurring again?
A webpage displays a potentially offensive advertisement on a computer. A customer walking by
notices the displayed advertisement and files complaint. Which of the following can BEST reduce
the likelihood of this incident occurring again?
Which of the following is an attack designed to activate based on date?
Which of the following is an attack designed to activate based on date?
Which of the following techniques is MOST likely to gather this type of data?
A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7
Which of the following techniques is MOST likely to gather this type of data?