Which of the following could the technician use to prep…
Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a
competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s integrity scan.Which of the following could the technician use to prepare the report? (Choose two.)
which of the following should Pete, an administrator, a…
While setting up a secure wireless corporate network, which of the following should Pete, an administrator,
avoid implementing?
Which of the following provides the HIGHEST level of co…
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
Which of the following is a concern when encrypting wir…
Which of the following is a concern when encrypting wireless data with WEP?
Which of the following provides the strongest authentic…
Which of the following provides the strongest authentication security on a wireless network?
Which of the following would BEST address this?
Joe, the system administrator, is setting up a wireless network for his team’s laptops only and needs to prevent
other employees from accessing it. Which of the following would BEST address this?
Which of the following actions should be taken to corre…
The IT department has installed new wireless access points but discovers that the signal extends far into the
parking lot. Which of the following actions should be taken to correct this?
Which of the following should the technician do to gath…
A security technician is attempting to access a wireless network protected with WEP. The technician does not
know any information about the network. Which of the following should the technician do to gather information
about the configuration of the wireless network?
Which of the following types of cryptography should be …
Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile
device?
Which of the following encryption methods offers this c…
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of
encryption strength with a lower key length than is typically necessary. Which of the following encryption
methods offers this capability?