Which of the following is an encryption algorithm that would meet this requirement?
A security administrator has been asked to implement a VPN that will support remote access over IPSEC.
Which of the following is an encryption algorithm that would meet this requirement?
Which of the following is a feature that is UNIQUE to Kerberos?
A security administrator is evaluating three different services: radius, diameter, and Kerberos. Which of
the following is a feature that is UNIQUE to Kerberos?
Which of the following can affect electrostatic discharge in a network operations center?
Which of the following can affect electrostatic discharge in a network operations center?
Which of the following is the attacker most likely utilizing?
a malicious attacker has intercepted HTTP traffic and inserted an ASCII line that sets the referrer URL.
Which of the following is the attacker most likely utilizing?
Which of the following should the security administrator implement?
A company would like to prevent the use of a known set of applications from being used on company
computers. Which of the following should the security administrator implement?
Which of the following explains this scenario?
A consultant has been tasked to assess a client’s network. The client reports frequent network outages.
Upon viewing the spanning tree configuration, the consultant notices that an old and law performing
edge switch on the network has been elected to be the root bridge. Which of the following explains this
scenario?
Which of the following portions of the company’s mobile device management…?
A new hire wants to use a personally owned phone to access company resources. The new hire expresses
concern about what happens to the data on the phone when they leave the company. Which of the
following portions of the company’s mobile device management configuration would allow the company
data to be removed from the device without touching the new hire’s data?
The access control method that BEST satisfies these objectives is:
An organization is trying to decide which type of access control is most appropriate for the network. The
current access control approach is too complex and requires significant overhead. Management would
like to simplify the access control and provide user with the ability to determine what permissions should
be applied to files, document, and directories. The access control method that BEST satisfies these
objectives is:
Which of the following password requirements will MOST effectively improve the security posture of the applica
While reviewing the security controls in place for a web-based application, a security controls assessor
notices that there are no password strength requirements in place. Because of this vulnerability,
passwords might be easily discovered using a brute force attack. Which of the following password
requirements will MOST effectively improve the security posture of the application against these attacks?
(Select two)
Which of the following should the administrator do to prevent all unapproved software from running on the user
A security administrator determined that users within the company are installing unapproved software.
Company policy dictates that only certain applications may be installed or ran on the user’s computers
without exception. Which of the following should the administrator do to prevent all unapproved
software from running on the user’s computer?