Which of the following solutions would have the BEST ch…
The Chief Information Officer (CIO) of an organization is concerned that the current locally-hosted, software threat solution is not agile enough. The CIO points to
specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better
chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these
goals?
Which of the following should the security technician r…
A security technician has been asked to recommend an authentication mechanism that will allow users to authenticate using a password that will only be valid for a
predefined time interval. Which of the following should the security technician recommend?
Which of the following will resolve the issue?
A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS
servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. Which of the following will resolve the issue?
Which of the following type of authentication mechanism…
An organization has introduced token-based authentication to system administrators due to risk of password compromise. The tokens have a set of numbers that
automatically change every 30 seconds. Which of the following type of authentication mechanism is this?
Which of the following should be exchanged on the acces…
While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all
other buildings’ connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity
issues?
Which of the following BEST describes using a smart car…
Which of the following BEST describes using a smart card and typing in a PIN to gain access to a system?
Which of the following protocols were designed to avoid…
Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select TWO)
which of the following security concepts?
Speaking a passphrase into a voice print analyzer is an example of which of the following security concepts?
Which of the following solutions would BEST resolve thi…
Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from
the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem?
which of the following?
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is physically stolen is to implement which of the following?