Which of the following authentication provides users XM…
Which of the following authentication provides users XML for authorization and authentication?
Which of the following would needs to be created for ea…
A new security policy being implemented requires all email within the organization be digitally signed by the
author using PGP. Which of the following would needs to be created for each user?
Which of the following is replayed during wireless auth…
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
Which of the followingports should be used?
An employee needs to connect to a server using a secure protocol on the default port. Which of the followingports should be used?
Which of the following technologies was developed to al…
Which of the following technologies was developed to allow companies to use less-expensive storage while still
maintaining the speed and redundancy required in a business environment?
Which of the following can be used to perform this action?
A system administrator has noticed network performance issues and wants to gather performance data from
the gateway router. Which of the following can be used to perform this action?
which of the following attacks is MOST likely underway …
Given the following list of corporate access points, which of the following attacks is MOST likely underway if the
company wireless network uses the same wireless hardware throughout?
MACSID
00:01:AB:FA:CD:34Corporate AP
00:01:AB:FA:CD:35Corporate AP
00:01:AB:FA:CD:36Corporate AP
00:01:AB:FA:CD:37Corporate AP
00:01:AB:FA:CD:34Corporate AP
Which of the following is the MOST likely reason for he…
In order to enter a high-security datacenter, users are required to speak the password into a voice recognition
system. Ann a member if the sales department over hears the password and upon speaks it into the system.
The system denies her entry and alerts the security team. Which of the following is the MOST likely reason for
her failure to enter the data center?
How can the administrator resolve this?
Users are trying to communicate with a network but are unable to do so. A network administrator sees
connection attempts on port 20 from outside IP addresses that are being blocked. How can the administrator
resolve this?
Which of the following describes the procedure the admi…
The security administrator runs an rpm verify command which records the MD5 sum, permissions, and
timestamp of each file on the system. The administrator saves this information to a separate server. Which of
the following describes the procedure the administrator has performed?