Which of the following attacks is occurring?
A technician reports a suspicious individual is seen walking around the corporate campus. The
individual is holding a smartphone and pointing a small antenna, in order to collect SSIDs. Which
of the following attacks is occurring?
Which of the following should be implemented in order to redirect these messages?
Users have reported receiving unsolicited emails in their inboxes, often times with malicious links
embedded. Which of the following should be implemented in order to redirect these messages?
Which of the following should be blocked on the firewall?
A company uses SSH to support internal users. They want to block external SSH connections
from reaching internal machines. Which of the following should be blocked on the firewall?
which of the following administrative control policy considerations MUST be addressed?
If an organization wants to implement a BYOD policy, which of the following administrative control
policy considerations MUST be addressed? (Select two)
Which of the following should the technician implement?
A security technician wants to implement stringent security controls over web traffic by restricting
the client source TCP ports allowed through the corporate firewall. Which of the following should
the technician implement?
Which of the following design elements would be used to segment the network based on organizational groups?
An administrator is configuring a network for all users in a single building. Which of the following
design elements would be used to segment the network based on organizational groups? (Select
two)
Which of the following options could improve the safety and security of the datacenter further?
A datacenter has suffered repeated burglaries which led to equipment theft and arson. In the past,
the thieves have demonstrated a determination to bypass any installed safeguards. After mantraps
were installed to prevent tailgating, the thieves crashed through the wall of datacenter with a
vehicle after normal business hours. Which of the following options could improve the safety and
security of the datacenter further? (Select two)
Which of the following can take advantage of man in the middle techniques to prevent data exfiltration?
Which of the following can take advantage of man in the middle techniques to prevent data
exfiltration?
Which of the following could be used?
An administrator must select an algorithm to encrypt data at rest. Which of the following could be
used?
which of the following?
RC4 is a strong encryption protocol that is general used with which of the following?