Which of the following should a technician recommend to prevent physical access to individual office areas?
Which of the following should a technician recommend to prevent physical access to individual office areas? (Select TWO).
Which of the following should the technician use to correct this problem?
After issuance a technician becomes aware that some keys were issued to individuals who are not authorized to use them. Which of the following should the technician use to correct this problem?
Which of the following BEST describes the term war driving?
Which of the following BEST describes the term war driving?
When is the BEST time to update antivirus definitions?
When is the BEST time to update antivirus definitions?
Why would a technician use a password cracker?
Why would a technician use a password cracker?
Which of following can BEST be used to determine the topology of a network and discover unknown devices?
Which of following can BEST be used to determine the topology of a network and discover unknown devices?
When should a technician perform penetration testing?
When should a technician perform penetration testing?
Which of the following is the MOST secure alternative for administrative access to a router?
Which of the following is the MOST secure alternative for administrative access to a router?
Which of the following mitigation techniques would address this concern?
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).
Which of the following does the technician need to do?
A technician is testing the security of a new database application with a website front-end. The technician notices that when certain characters are input into the application it will crash the server. Which of the following does the technician need to do?