Which of the following provides the BEST solution?
A corporation has experienced several media leaks of proprietary data on various web forums. The posts
were made during business hours and it is believed that the culprit is posting during work hours from a
corporate machine. The Chief Information Officer (CIO) wants to scan internet traffic and keep records for
later use in legal proceedings once the culprit is found. Which of the following provides the BEST
solution?
Which of the following describes the procedure the administrator has performed?
The security administrator runs an rpm verify command which records the MD5 sum, permissions, and
timestamp of each file on the system. The administrator saves this information to a separate server.
Which of the following describes the procedure the administrator has performed?
How can the administrator resolve this?
Users are trying to communicate with a network but are unable to do so. A network administrator sees
connection attempts on port 20 from outside IP addresses that are being blocked. How can the
administrator resolve this?
Which of the following is the MOST likely reason for her failure to enter the data center?
In order to enter a high-security datacenter, users are required to speak the password into a voice
recognition system. Ann a member if the sales department over hears the password and upon speaks it
into the system. The system denies her entry and alerts the security team. Which of the following is the
MOST likely reason for her failure to enter the data center?
which of the following attacks is MOST likely underway if the company wireless network uses the same wireless
Given the following list of corporate access points, which of the following attacks is MOST likely underway
if the company wireless network uses the same wireless hardware throughout?
MAC SID
00:01:AB:FA:CD:34 Corporate AP
00:01:AB:FA:CD:35 Corporate AP
00:01:AB:FA:CD:36 Corporate AP
00:01:AB:FA:CD:37 Corporate AP
00:01:AB:FA:CD:34 Corporate AP
Which of the following can be used to perform this action?
A system administrator has noticed network performance issues and wants to gather performance data
from the gateway router. Which of the following can be used to perform this action?
Which of the following ports should be used?
An employee needs to connect to a server using a secure protocol on the default port. Which of the
following ports should be used?
Which of the following technologies was developed to allow companies…?
Which of the following technologies was developed to allow companies to use less-expensive storage
while still maintaining the speed and redundancy required in a business environment?
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
Which of the following would needs to be created for each user?
A new security policy being implemented requires all email within the organization be digitally signed by
the author using PGP. Which of the following would needs to be created for each user?