Which of the following choices BEST meets her intent of security and access?
Ann a new small business owner decides to implement WiFi access for her customers. There are several
other businesses nearby who also have WiFi hot spots. Ann is concerned about security of the wireless
network and wants to ensure that only her customers have access. Which of the following choices BEST
meets her intent of security and access?
Which of the following technologies provide the MOST complete protection?
A security engineer is tasked with encrypting corporate email. Which of the following technologies
provide the MOST complete protection? (Select TWO)
Which of the following is the GREATEST security concern of allowing employees to bring in their personally own
Which of the following is the GREATEST security concern of allowing employees to bring in their
personally owned tablets and connecting to the corporate network?
which of the following phases of incident response?
Searching for systems infected with malware is considered to be which of the following phases of incident
response?
Which of the following services could be run on the VPN concentrator to perform this authentication?
A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a
backend directory service. Which of the following services could be run on the VPN concentrator to
perform this authentication?
Which of the following can BEST reduce the likelihood of this incident occurring again?
A webpage displays a potentially offensive advertisement on a computer. A customer walking by notices
the displayed advertisement and files complaint. Which of the following can BEST reduce the likelihood of
this incident occurring again?
Which of the following is an attack designed to activate based on date?
Which of the following is an attack designed to activate based on date?
Which of the following techniques is MOST likely to gather this type of data?
A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7
Which of the following techniques is MOST likely to gather this type of data?
Which of the following security controls would be MOST appropriate?
A company wants to prevent unauthorized access to its secure data center. Which of the following
security controls would be MOST appropriate?
Which of the following password parameters is MOST likely misconfigured?
Company policy requires employees to change their passwords every 60 days. The security manager has
verified all systems are configured to expire passwords after 60 days. Despite the policy and technical
configuration, weekly password audits suggest that some employees have had the same weak passwords
in place longer than 60 days. Which of the following password parameters is MOST likely misconfigured?