which of the following administrative control policy co…
If an organization wants to implement a BYOD policy, which of the following administrative control policy
considerations MUST be addressed? (Choose two)
Which of the following should be blocked on the firewall?
A company uses SSH to support internal users. They want to block external SSH connections from reaching
internal machines. Which of the following should be blocked on the firewall?
Which of the following should be implemented in order t…
Users have reported receiving unsolicited emails in their inboxes, often times with malicious links embedded.
Which of the following should be implemented in order to redirect these messages?
Which of the following attacks is occurring?
A technician reports a suspicious individual is seen walking around the corporate campus. The individual is
holding a smartphone and pointing a small antenna, in order to collect SSIDs. Which of the following attacks is
occurring?
Which of the following would allow the phones to be pow…
A technician is configuring a switch to support VOPIP phones. The technician wants to ensure the phones do
not require external power packs. Which of the following would allow the phones to be powered using the
network connection?
Which of the following commands would provide the BEST …
A network technician has received comments from several users that cannot reach a particular website. Which
of the following commands would provide the BEST information about the path taken across the network to this
website?
Which of the following may be used with a BNC connector?
Which of the following may be used with a BNC connector?
Which of the following BEST describes this of attack?
An attacker Joe configures his service identifier to be as an access point advertised on a billboard. Joe then
conducts a denial of service attack against the legitimate AP causing users to drop their connections and then
reconnect to Joe’s system with the same SSID. Which of the following BEST describes this of attack?
Which of the following would be MOST appropriate in thi…
A security administrator wishes to prevent certain company devices from using specific access points, while stillallowing them on others. All of the access points use the same SSID and wireless password. Which of the
following would be MOST appropriate in this scenario?
Which of the following is a black box testing methodology?
Which of the following is a black box testing methodology?