Which of the following attacks is taking place?
A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to connect to it.
Only after an authorized client has connected and the hacker was able to capture the client handshake with the
AP can the hacker begin a brute force attack to discover the encryption key. Which of the following attacks is
taking place?
Which of the following allows Pete, a security technici…
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
Which of the following protocols operates at the HIGHES…
Which of the following protocols operates at the HIGHEST level of the OSI model?
Which of the following default ports should Ann ensure …
Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using
Kerberos authentication, but she cannot connect to the destination machine. Which of the following default
ports should Ann ensure is open?
Which of the following ports should be opened on thefir…
A technician is unable to manage a remote server. Which of the following ports should be opened on thefirewall for remote server management? (Choose two.)
Which of the following ports would be blocked if Pete, …
Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to
websites?
Which of the following ports may have been closed to ca…
A technician has just installed a new firewall onto the network. Users are reporting that they cannot reach any
website. Upon further investigation, the technician determines that websites can be reached by entering their IP
addresses. Which of the following ports may have been closed to cause this issue?
Which of the following ports should be opened?
A security technician needs to open ports on a firewall to allow for domain name resolution.
Which of the following ports should be opened? (Choose two.)
Which of the following protocol types is observed in th…
During the analysis of a PCAP file, a security analyst noticed several communications with a remote server on
port 53. Which of the following protocol types is observed in this traffic?
Which of the following secure file transfer methods use…
Which of the following secure file transfer methods uses port 22 by default?