Which of the following security measures can the admini…
The security administrator has noticed cars parking just outside of the building fence line. Which of the following security measures can the administrator use to
help protect the company’s WiFi network against war driving? (Select TWO)
Which of the following should the technician use to vie…
A network technician is trying to determine the source of an ongoing network based attack. Which of the following should the technician use to view IPv4 packet
data on a particular internal network segment?
Which of the following allows an application to securel…
Which of the following allows an application to securely authenticate a user by receiving credentials from a web domain?
Which of the following describes the encrypted data?
The administrator installs database software to encrypt each field as it is written to disk. Which of the following describes the encrypted data?
which of the following is the MOST appropriate hashing …
When generating a request for a new x.509 certificate for securing a website, which of the following is the MOST appropriate hashing algorithm?
Which of the following BEST describes the assessment th…
During a recent audit, it was discovered that many services and desktops were missing security patches. Which of the following BEST describes the assessment
that was performed to discover this issue?
Which of the following security-related training could …
Ann, a college professor, was recently reprimanded for posting disparaging remarks regarding her coworkers on a web site. Ann stated that she was not aware that
the public was able to view her remakes. Which of the following security-related training could have made Ann aware of the repercussions of her actions?
Which of the following algorithms is appropriate for se…
An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files, the organization wants to ensure a secure
exchange of keys. Which of the following algorithms is appropriate for securing the key exchange?
which of the following?
An attack that is using interference as its main attack to impede network traffic is which of the following?
Which of the following would provide the BEST solution?
The IT department needs to prevent users from installing untested applications. Which of the following would provide the BEST solution?