PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality

Ann, a security administrator, has concerns regarding her company’s wireless network. The
network is open and available for visiting prospective clients in the conference room, but she
notices that many more devices are connecting to the network than should be. Which of the
following would BEST alleviate Ann’s concerns with minimum disturbance of current
functionality for clients?

which of the following as a mitigation method against further attempts?

Joe analyzed the following log and determined the security team should implement which of
the following as a mitigation method against further attempts?
Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local
[00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124
[00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124
[00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124
[00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124

Which of the following is this an example of?

A computer supply company is located in a building with three wireless networks. The
system security team implemented a quarterly security scan and saw the following.
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?

which of the following should be accessible locally from every site to ensure users with bad certificates cann

A systems administrator has implemented PKI on a classified government network. In the
even0074 that a disconnect occurs from the primary CA, which of the following should be
accessible locally from every site to ensure users with bad certificates cannot gain access to
the network?

Which of the following sets of commands would meet this requirement?

Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can
be accessed using the same password. The company’s network device security policy
mandates that at least one virtual terminal have a different password than the other virtual
terminals. Which of the following sets of commands would meet this requirement?

Which of the following could the technician use to prepare the report?

Joe, an employee, was escorted from the company premises due to suspicion of revealing
trade secrets to a competitor. Joe had already been working for two hours before leaving the
premises. A security technician was asked to prepare a report of files that had changed
since last night’s integrity scan. Which of the following could the technician use to prepare
the report? (Select TWO).