Which of the following is a security benefit gained fro…
Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following is a way to implement a technica…
Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile device theft?
Which of the following types of network would be set up…
Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such
as printers and servers?
Which of the following types of encryption will help in…
Which of the following types of encryption will help in protecting files on a PED?
which of the following NAC features?
The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which
of the following NAC features?
Which of the following can be used to mitigate risk if …
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system.
Which of the following should the technician perform?
Which of the following would BEST address the administr…
A security administrator has concerns regarding employees saving data on company provided mobile devices. Which of the following would BEST address the
administrator’s concerns?
which of the following manners would meet the company’s…
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any
protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company’s
objectives?
Which of the following BEST protects the master passwor…
A team of firewall administrators have access to a `master password list’ containing service account passwords. Which of the following BEST protects the master
password list?