Which of the following BEST describes the company’s wireless network solution?
Ann a new security specialist is attempting to access the internet using the company’s open wireless
network. The wireless network is not encrypted: however, once associated, ANN cannot access the
internet or other company resources. In an attempt to troubleshoot, she scans the wireless network with
NMAP, discovering the only other device on the wireless network is a firewall. Which of the following
BEST describes the company’s wireless network solution?
Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities ass
Which of the following, if implemented, would improve security of remote users by reducing
vulnerabilities associated with data-in-transit?
Which of the following is considered an environmental control that can be deployed to meet this goal?
A company wants to improve its overall security posture by deploying environmental controls in its
datacenter. Which of the following is considered an environmental control that can be deployed to meet
this goal?
Which of the following should be used to accomplish this task?
A programmer must write a piece of code to encrypt passwords and credit card information used by an
online shopping cart. The passwords must be stored using one-way encryption, while credit card
information must be stored using reversible encryption. Which of the following should be used to
accomplish this task? (Select TWO)
Which of the following should the company implement?
A company needs to provide a secure backup mechanism for key storage in a PKI. Which of the following
should the company implement?
Which of the following supported list of ciphers MUST the security analyst disable?
A security analyst must ensure that the company’s web server will not negotiate weak ciphers with
connecting web browsers. Which of the following supported list of ciphers MUST the security analyst
disable? (Select THREE)
Which of the following concepts is being implemented?
A company’s application is hosted at a data center. The data center provides security controls for the
infrastructure. The data center provides a report identifying serval vulnerabilities regarding out of date OS
patches. The company recommends the data center assumes the risk associated with the OS
vulnerabilities. Which of the following concepts is being implemented?
Which of the following cryptographic methods is most secure for a wireless access point?
Which of the following cryptographic methods is most secure for a wireless access point?
Which of the following is considered an environmental control?
Which of the following is considered an environmental control?
Which of the following Best describes this type of attack?
An attacker Joe configures his service identifier to be the same as an access point advertised on a
billboard. Joe then conducts a denial of service attack against the legitimate AP causing users to drop
their connections and then reconnect to Joe’s system with the same SSID. Which of the following Best
describes this type of attack?