Which of the following algorithms with transport encryption would be implemented to provide the MOST secure we
Recent data loss on financial servers due to security breaches forced the system administrator to
harden their systems. Which of the following algorithms with transport encryption would be
implemented to provide the MOST secure web connections to manage and access these servers?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following types of authentication is being described?
A company requires that a user’s credentials include providing something they know and
something they are in order to gain access to the network. Which of the following types of
authentication is being described?
Which of the following would accomplish this?
A company wants to ensure that all credentials for various systems are saved within a central
database so that users only have to login once for access to all systems. Which of the following
would accomplish this?
Which of the following attacks is occurring?
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs
show repeated connection attempts from the following IP:
10.10.3.23
These attempts are overloading the server to the point that it cannot respond to traffic. Which of
the following attacks is occurring?
Which of the following attacks does this action remediate?
Physical documents must be incinerated after a set retention period is reached. Which of the
following attacks does this action remediate?
Which of the following attacks does this action remediate?
All executive officers have changed their monitor location so it cannot be easily viewed when
passing by their offices. Which of the following attacks does this action remediate?
Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to end TLS encryp
Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to
end TLS encryption?
Which of the following may be used to meet this objective?
A security administrator has been tasked with setting up a new internal wireless network that must
use end to end TLS. Which of the following may be used to meet this objective?
Which of the following techniques are used above?
After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following techniques are used above? (Select TWO).