Which of the following can be implemented in hardware or software to protect a web server from cross-site scri
Which of the following can be implemented in hardware or software to protect a web server
from cross-site scripting attacks?
Which of the following utilities would be BEST to check for any error codes?
The customer reports their PC freezes up everyday around the same time. Which of the following
utilities would be BEST to check for any error codes?
Which of the following devices transmits data to all ports regardless of final destination?
Which of the following devices transmits data to all ports regardless of final destination?
Which of the following means of wireless authentication is easily vulnerable to spoofing?
Which of the following means of wireless authentication is easily vulnerable to spoofing?
Which of the following Control Panel options would correct this?
A user is looking for the Application Data directory in their profile but cannot see it. Which of the
following Control Panel options would correct this?
Which of the following would be an important step to perform BEFORE replacing the component?
A technician needs to replace an internal component on a laptop. Which of the following would be
an important step to perform BEFORE replacing the component?
The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-si
The BEST methods for a web developer to prevent the website application code from being
vulnerable to cross-site request forgery (XSRF) are to: (Select TWO).
Which of the following ports should be opened to allow POP3 mail traffic through the firewall?
While configuring a new email application that uses POP3 for a customer, the technician determines
the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail
traffic through the firewall?
Which of the following is MOST likely to have a physical switch on a laptop that allows it to be turned off wi
Which of the following is MOST likely to have a physical switch on a laptop that allows it to be turned
off without going into the BIOS?
Which of the following is an authentication method Jane should use?
Jane, a security administrator, needs to implement a secure wireless authentication method
that uses a remote RADIUS server for authentication. Which of the following is an
authentication method Jane should use?