Which of the following is a concern when encrypting wir…
Which of the following is a concern when encrypting wireless data with WEP?
Which of the following is considered a classless routin…
Which of the following is considered a classless routing protocol?
Which of the following provides the strongest authentic…
Which of the following provides the strongest authentication security on a wireless network?
Which of the following would BEST address this?
Joe, the systems administrator, is setting up a wireless network for his team’s laptops only and needs to prevent other employees from accessing it. Which of the
following would BEST address this?
Which of the following is a document that is used in cy…
Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?
Which of the following actions should be taken to corre…
The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be
taken to correct this?
Which of the following will MOST likely be an issue wit…
A technician who is working with a junior member of the team is called away for another issue. The junior technician orders an SC 80/125 fiber cable instead of an
ST 80/125. Which of the following will MOST likely be an issue with the new cable?
Which of the following should the technician do to gath…
A security technician is attempting to access a wireless network protected with WEP. The technician does not know any information about the network. Which of
the following should the technician do to gather information about the configuration of the wireless network?
which of the following is the BEST course of action for…
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted id this change is not immediate.
The request come directly from management, and there is no time to go through the emergency change control process. Given this scenario, which of the following
is the BEST course of action for the network administrator to take?
Which of the following types of cryptography should be …
Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device?