Which of the following will BEST mitigate the risk if implemented on the switches?
A security technician at a small business is worried about the Layer 2 switches in the network
suffering from a DoS style attack caused by staff incorrectly cabling network connections between
switches. Which of the following will BEST mitigate the risk if implemented on the switches?
Which of the following antennas would be BEST for this situation?
An administrator wants to establish a WiFi network using a high gain directional antenna with a
narrow radiation pattern to connect two buildings separated by a very long distance. Which of the
following antennas would be BEST for this situation?
Which of the following BEST describes this type of attack?
An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?
Which of the following is an XML based open standard used in the exchange of authentication and authorization
Which of the following is an XML based open standard used in the exchange of authentication and
authorization information between different parties?
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow i
Which of the following ports and protocol types must be opened on a host with a host-based
firewall to allow incoming SFTP connections?
Which of the following types of malware is on Ann’s workstation?
A user, Ann, is reporting to the company IT support group that her workstation screen is blank
other than a window with a message requesting payment or else her hard drive will be formatted.
Which of the following types of malware is on Ann’s workstation?
Which of the following controls can be implemented together to prevent data loss in the event of theft of a mo
Which of the following controls can be implemented together to prevent data loss in the event of
theft of a mobile device storing sensitive information? (Select TWO).
A way to assure data at-rest is secure even in the event of loss or theft is to usE
A way to assure data at-rest is secure even in the event of loss or theft is to usE.
Which of the following is occurring?
A security audit identifies a number of large email messages being sent by a specific user from
their company email account to another address external to the company. These messages were
sent prior to a company data breach, which prompted the security audit. The user was one of a
few people who had access to the leaked data. Review of the suspect’s emails show they consist
mostly of pictures of the user at various locations during a recent vacation. No suspicious activities
from other users who have access to the data were discovered.
Which of the following is occurring?
Which of the following protocols was used to access the server remotely?
A security analyst is reviewing firewall logs while investigating a compromised web server. The
following ports appear in the loG.
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?