Which of the following should be used to allow fir proper communication between internet users and the interna
The network manager has obtained a public IP address for use with a new system to be available via the
internet. This system will be placed in the DMZ and will communicate with a database server on the LAN.
Which of the following should be used to allow fir proper communication between internet users and the
internal systems?
Which of the following issues could be causing the problem?
After a new RADIUS server is added to the network, an employee is unable to connect to the company’s
WPA2-Enterprise WIFI network, which is configured to prompt for the employee’s network username and
password. The employee reports receiving an error message after a brief connection attempt, but is
never prompted for credentials. Which of the following issues could be causing the problem?
Which of the following security controls should be implemented to BEST remediate this?
Ann the security administrator has been reviewing logs and has found several overnight sales personnel
are accessing the finance department’s network shares. Which of the following security controls should
be implemented to BEST remediate this?
Which of the following should be in the agreement with the farmer to protect the availability of the network?
A fiber company has acquired permission to bury a fiber cable through a famer’s land. Which of the
following should be in the agreement with the farmer to protect the availability of the network?
The security analyst classifies this as a (N).
The programmer confirms that there is potential for a buffer overflow on one of the data input fields in a
corporate application. The security analyst classifies this as a (N).
Which of the following algorithms support ephemeral modes?
A security technician would like to use ciphers that generate ephemeral keys for secure communication.
Which of the following algorithms support ephemeral modes? (Select TWO)
Which of the following concepts would BEST meet this goal?
A security technician would like an application to use random salts to generate short lived encryption leys
during the secure communication handshake process to increase communication security. Which of the
following concepts would BEST meet this goal?
Which of the following would accomplish this task?
A security administrator wishes to implement a method of generating encryption keys from user
passwords to enhance account security. Which of the following would accomplish this task?
Which of the following ports should be configured?
An administrator needs to allow both secure and regular web traffic into a network. Which of the
following ports should be configured? (Select TWO)
Which of the following practices could be used to increase the security posture during deployment?
A recent audit had revealed weaknesses in the process of deploying new servers and network devices.
Which of the following practices could be used to increase the security posture during deployment?
(Select TWO).