Which of the following areas should be addressed FIRST?
A local hospital with a large four-acre campus wants to implement a wireless network so that doctors can use
tablets to access patients’ medical data. The hospital also wants to provide guest access to the internet for
hospital patients and visitors in select areas. Which of the following areas should be addressed FIRST?
Which of the following practices could be used to incre…
A recent audit had revealed weaknesses in the process of deploying new servers and network devices. Which
of the following practices could be used to increase the security posture during deployment? (Choose two.)
Which of the following ports should be configured?
An administrator needs to allow both secure and regular web traffic into a network. Which of the following ports
should be configured? (Choose two.)
Which of the following would accomplish this task?
A security administrator wishes to implement a method of generating encryption keys from user passwords to
enhance account security. Which of the following would accomplish this task?
Which of the following concepts would BEST meet this goal?
A security technician would like an application to use random salts to generate short lived encryption leys during
the secure communication handshake process to increase communication security. Which of the following
concepts would BEST meet this goal?
Whichof the following algorithms support ephemeral modes?
A security technician would like to use ciphers that generate ephemeral keys for secure communication. Whichof the following algorithms support ephemeral modes? (Choose two.)
The security analyst classifies this as a (N).
The programmer confirms that there is potential for a buffer overflow on one of the data input fields in a
corporate application. The security analyst classifies this as a (N).
Which of the following should be in the agreement with …
A fiber company has acquired permission to bury a fiber cable through a famer’s land. Which of the following
should be in the agreement with the farmer to protect the availability of the network?
Which of the following security controls should be impl…
Ann, the security administrator, has been reviewing logs and has found several overnight sales personnel are
accessing the finance department’s network shares.
Which of the following security controls should be implemented to BEST remediate this?
Which of the following issues could be causing the problem?
After a new RADIUS server is added to the network, an employee is unable to connect to the company’s
WPA2-Enterprise WIFI network, which is configured to prompt for the employee’s network username and
password. The employee reports receiving an error message after a brief connection attempt, but is never
prompted for credentials. Which of the following issues could be causing the problem?