Which of the following should the technician do to reso…
A technician installed two ground plane antennae on 802.11n bridges connecting two buildings 500 feet apart.
After configuring both radios to work at 2.4ghz and implementing the correct configuration, connectivity tests
between the two buildings are unsuccessful. Which of the following should the technician do to resolve the
connectivity problem?
Which of the following are unique to white box testing …
Which of the following are unique to white box testing methodologies? (Choose two)
Which of the following technologies can provide protect…
The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
Which of the following would be the best option?
A Chief Privacy Officer, Joe, is concerned that employees are sending emails to addresses outside of the
company that contain PII. He asks that the security technician to implement technology that will mitigate this
risk. Which of the following would be the best option?
which of the following security concepts will most effe…
While preparing for an audit a security analyst is reviewing the various controls in place to secure the operation
of financial processes within the organization. Based on the pre assessment report, the department does not
effectively maintain a strong financial transaction control environment due to conflicting responsibilities held by
key personnel. If implemented, which of the following security concepts will most effectively address the
finding?
The testing company will be using:
A security director has contracted an outside testing company to evaluate the security of a newly developed
application. None of the parameters or internal workings of the application have been provided to the testing
company prior to the start of testing. The testing company will be using:
Which of the following would show the administrator tha…
A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access
point. Which of the following would show the administrator that wpa2 is also needed?
Which of the following describes this type of attack?
An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop look
like an access point and advertises the same network as the coffee shop normally does. Which of the following
describes this type of attack?
Which of the following is the best option for meeting t…
A company has several public conference room areas with exposed network outlets. In the past, unauthorized
visitors and vendors have used the outlets for internet access. The help desk manager does not want the
outlets to be disabled due to the number of training sessions in the conference room and the amount of time it
takes to get the ports either patched in or enabled. Which of the following is the best option for meeting this
goal?
Which of the following is the first course of action th…
Joe, an end user, has received a virus detection warning.
Which of the following is the first course of action that should be taken?