Which of the following should the administrator impleme…
A company provides wireless access for employees and a guest wireless network for visitors. The employee wireless network is encrypted and requires a
password. The guest wireless network does not use an encrypted connection and does not require a password. An administrator walks by a visitor’s laptop and
notices the following command line output:
reaver – I mon – b 7a : E5 : 9A : 42 : 2C : C1 – vv
Starting…..
[+] Trying pin 12345678
[+] 93.41% complete @ 2015-01-10 10:30:21 (15 seconds)
[!] WARNING: 10 failed connections in a row
[+] Trying pin 12345688
…
Which of the following should the administrator implement and why?
Which of the following capabilities would be MOST suita…
A network has been impacted by downtime resulting from unauthorized devices connecting directly to the wired network. The network administrator has been
tasked to research and evaluate technical controls that would effectively mitigate risks associated with such devices. Which of the following capabilities would be
MOST suitable for implementation in this scenario?
Which of the following principles of effectiveness did …
An attacker is able to successfully execute a social engineering attack by entering a building while dressed as a building security guard. Which of the following
principles of effectiveness did the attacker utilize to execute the attack?
Which of the following ports should be blocked by the f…
A firewall administrator has been instructed to block common Microsoft file sharing ports due to a recent malware outbreak. Which of the following ports should be
blocked by the firewall? (Select TWO).
Which of the following can the technician use to verify…
A technician wants to verify the authenticity of the system files of a potentially compromised system. Which of the following can the technician use to verify if a
system file was compromised? (Select TWO).
Which of the following is a critical security considera…
A company hosts sites for multiple vendors and provides information to users globally. Which of the following is a critical security consideration in this environment?
Which of the following should Joe enable on his worksta…
Joe, a user, wants to configure his work station to make certain that the certificate he receives when connecting to websites is still valid. Which of the following
should Joe enable on his workstation to achieve this?
An annual audit of the business partner is conducted ag…
A company exchanges information with a business partner. An annual audit of the business partner is conducted against the SLA in order to verify.
How can a technician BEST disprove this argument?
During a trial for possession of illegal content, a defence attorney argues that several of the files on the forensic image may have been tampered with. How can a
technician BEST disprove this argument?
Which of the following protocols would BEST facilitate …
A security administrator wishes to implement a secure method of file transfer when communicating with outside organizations. Which of the following protocols
would BEST facilitate secure file transfers? (Select TWO).