PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following allows wireless use while mitigating this type of attack?

In the course of troubleshooting wireless issues from users a technician discovers that users are
connecting to their home SSIDs which the technician scans but detects none of these SSIDs. The
technician eventually discovers a rouge access point that spoofs any SSID request. Which of the
following allows wireless use while mitigating this type of attack?

Which of the following is the BEST recommendation for the web administrator?

A web administrator has just implemented a new web server to be placed in production. As part of
the company’s security plan, any new system must go through a security test before it is placed in
production. The security team runs a port scan resulting in the following data:
21 tcp open FTP
23 tcp open Telnet
22 tcp open SSH
25 UDP open smtp
110 tcp open pop3
443 tcp open https
Which of the following is the BEST recommendation for the web administrator?

Which of the following authentication mechanisms should be utilized to meet this goal?

An organization has an internal PKI that utilizes client certificates on each workstation. When
deploying a new wireless network, the security engineer has asked that the new network
authenticate clients by utilizes the existing client certificates. Which of the following authentication
mechanisms should be utilized to meet this goal?