Which of the following software features should be configured on the access points?
An organization does not want the wireless network name to be easily discovered. Which of the
following software features should be configured on the access points?
This review process depends on:
A computer is suspected of being compromised by malware. The security analyst examines the
computer and finds that a service called Telnet is running and connecting to an external website
over port 443. This Telnet service was found by comparing the system’s services to the list of
standard services on the company’s system image. This review process depends on:
This technique is known as:
A software developer wants to prevent stored passwords from being easily decrypted. When the
password is stored by the application, additional text is added to each password before the
password is hashed. This technique is known as:
which of the following steps of incident response does a team analyze the incident and determine steps to prev
In which of the following steps of incident response does a team analyze the incident and
determine steps to prevent a future occurrence?
Which of the following should the security technician recommend?
A security technician has been asked to recommend an authentication mechanism that will allow
users to authenticate using a password that will only be valid for a predefined time interval. Which
of the following should the security technician recommend?
Which of the following wireless encryption methods should be implemented?
A security administrator must implement a wireless encryption system to secure mobile devices’
communication. Some users have mobile devices which only support 56-bit encryption. Which of
the following wireless encryption methods should be implemented?
which of the following should be done at the beginning?
After a security incident involving a physical asset, which of the following should be done at the
beginning?
Which of the following is the GREATEST security risk of two or more companies working together under a Memoran
Which of the following is the GREATEST security risk of two or more companies working together
under a Memorandum of Understanding?
Which of the following is the name of the database repository for these certificates?
Joe, a user, reports to the system administrator that he is receiving an error stating his certificate
has been revoked. Which of the following is the name of the database repository for these
certificates?
which of the following core security areas?
A software company has completed a security assessment. The assessment states that the
company should implement fencing and lighting around the property. Additionally, the assessment
states that production releases of their software should be digitally signed. Given the
recommendations, the company was deficient in which of the following core security areas?
(Select TWO).