While troubleshooting a new wireless 802.11 ac network an administrator discovers that several of the older
systems cannot connect. Upon investigation the administrator discovers that the older devices only support
802.11 and RC4. The administrator does not want to affect the performance of the newer 802.11 ac devices on
the network. Which of the following should the administrator do to accommodate all devices and provide the
The network security manager has been notified by customer service that employees have been sending
unencrypted confidential information via email. Which of the following should the manager select to BEST
detect and provide notification of these occurrences?
A security technician is implementing PKI on a Network. The technician wishes to reduce the amount of
bandwidth used when verifying the validity of a certificate. Which of the following should the technician
A company uses port security based on an approved MAC list to secure its wired network and WPA2 to secure
its wireless network. Which of the following prevents an attacker from learning authorized MAC addresses?
A worker dressed in a fire suppression company’s uniform asks to be let into the server room to perform the
annual check in the fire extinguishers. The system administrator allows the worker into the room, only to
discover hours later that the worker was actually a penetration tester. Which of the following reasons allowed
the penetration tester to access the server room?
The new Chief Information Officer (CIO) of company ABC, Joe has noticed that company XWY is always one
step ahead with similar products. He tasked his Chief Security Officer to implement new security controls to
ensure confidentiality of company ABC’s proprietary data and complete accountability for all data transfers.
Which of the following security controls did the Chief Security Officer implement to BEST meet these
requirements? (Choose Two)
A user authenticates to a local directory server. The user then opens a virtualization client to connect to a virtual
server. Instead of supplying a username/password combination, the user simply checks a “use directory
credentials” checkbox to authenticate to the virtual server. Which of the following authentication types has been
An employee attempts to go to a well-known bank site using the company-standard web browser by correctly
typing in the address of the site into the web browser. The employee is directed to a website that looks like the
bank’s site but is not the actual bank site. The employee’s user name and password are subsequently stolen.
Which of the following is this an example of?
Joe, a technician, initiated scans if the company’s 10 routers and discovered that half if the routers were not
changed from their default configuration prior installed on the network.
Which of the following would address this?
Joe, a system administrator, receives reports that users attempting to reach the corporate website are arriving
at an unfamiliar website instead. An investigation by a forensic analyst found that the name server log has
several corporate IP addresses that were changed using Joe’s credentials.
Which of the following is this attack called?