Which of the following can be used to do this without using certificates?
Ann a security administrator wants a limit access to the wireless network. Which of the following
can be used to do this without using certificates?
Which of the following should the user do to enforce full device confidentiality should the phone be lost or s
A user has an Android smartphone that supports full device encryption. However when the user
plus into a computer all of the files are immediately accessible. Which of the following should the
user do to enforce full device confidentiality should the phone be lost or stolen?
Which of the following should be used to allow fir proper communication between internet users and the interna
The network manager has obtained a public IP address for use with a new system to be available
via the internet. This system will be placed in the DMZ and will communicate with a database
server on the LAN. Which of the following should be used to allow fir proper communication
between internet users and the internal systems?
Which of the following issues could be causing the problem?
After a new RADIUS server is added to the network, an employee is unable to connect to the
company’s WPA2-Enterprise WIFI network, which is configured to prompt for the employee’s
network username and password. The employee reports receiving an error message after a brief
connection attempt, but is never prompted for credentials. Which of the following issues could be
causing the problem?
Which of the following security controls should be implemented to BEST remediate this?
Ann the security administrator has been reviewing logs and has found several overnight sales
personnel are accessing the finance department’s network shares. Which of the following security
controls should be implemented to BEST remediate this?
Which of the following should be in the agreement with the farmer to protect the availability of the network?
A fiber company has acquired permission to bury a fiber cable through a famer’s land. Which of
the following should be in the agreement with the farmer to protect the availability of the network?
The security analyst classifies this as a (N).
The programmer confirms that there is potential for a buffer overflow on one of the data input fields
in a corporate application. The security analyst classifies this as a (N).
Which of the following algorithms support ephemeral modes?
A security technician would like to use ciphers that generate ephemeral keys for secure
communication. Which of the following algorithms support ephemeral modes? (Select TWO)
Which of the following concepts would BEST meet this goal?
A security technician would like an application to use random salts to generate short lived
encryption leys during the secure communication handshake process to increase communication
security. Which of the following concepts would BEST meet this goal?
Which of the following would accomplish this task?
A security administrator wishes to implement a method of generating encryption keys from user
passwords to enhance account security. Which of the following would accomplish this task?
