Which of the following is the MOST likely authentication scheme used in 802.1x?
Which of the following is the MOST likely authentication scheme used in 802.1x?
Which of the following should be recommended?
To ensure compatibility with their flagship product, the security engineer is tasked to recommend
an encryption cipher that will be compatible with the majority of third party software and hardware
vendors. Which of the following should be recommended?
Which of the following will allow secure remote login on a managed device?
Which of the following will allow secure remote login on a managed device?
Which of the following features will a firewall MOST likely use to detect and prevent malicious traffic on the
Which of the following features will a firewall MOST likely use to detect and prevent
malicious traffic on the network?
Which of the following ports support hot swapping?
Which of the following ports support hot swapping?
Each correct answer represents a complete solution. Choose two.
what was discovered?
A security analyst discovered data such as images and word documents hidden within different
types of files. Which of the following cryptographic concepts describes what was discovered?
Which of the following conditions are required for an administrator to be able to use an MDM solution to remot
Which of the following conditions are required for an administrator to be able to use an MDM
solution to remote wipe a lost device? (Select TWO).
Which of the following does not affect security on a wireless access point?
Which of the following does not affect security on a wireless access point?
Which of the following de-duplication techniques will require less processing power on the host but more initi
Which of the following de-duplication techniques will require less processing power on the host but
more initial disk space on the storage array?
Which of the following ports should Matt, the security administrator, open on the firewall?
After a new firewall has been installed, devices cannot obtain a new IP address. Which of the
following ports should Matt, the security administrator, open on the firewall?