Which of the following should be implemented to provide…
A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk’s
wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk?
Which of the following would fulfill the CISO’s require…
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO’s
requirements?
Which of the following is the cause of this issue?
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue?
Which of the following describes this access control type?
Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which
of the following describes this access control type?
Which of the following should be used to ensure a speci…
Which of the following should be used to ensure a specific device always receives the same IP address?
which of the following attacks?
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?
Which of the following ports should be allowed to provi…
Which of the following ports should be allowed to provide access to certain VoIP applications?
which of the following?
A network administrator uses an RFID card to enter the datacenter, a key to open the server rack, and a username and password to logon to a server. These are
examples of which of the following?
which of the following security measure types?
An area to which access is controlled by retina scan is protected by which of the following security measure types?
which of the following should the security technician r…
A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration
management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the
following should the security technician respond?