Which of the following is a commonly used wireless encryption method?
Which of the following is a commonly used wireless encryption method?
What do you suggest the technician should do?
It has been noted that the door to a server room at Certkiller .com has been propped open. What
do you suggest the technician should do?
What should you do when you notice that the door to the company’s server room was left ajar by another t
What should you do when you notice that the door to the company’s server room was left ajar by
another technician?
Select the type of attack that was launched against Certkiller .com.
You work as the security administrator at Certkiller .com. You are busy auditing the Certkiller .com
wireless network. You find an unauthorized Access Point under the desk of a user named Amy
Walsh. Amy works in the Finance department. You confront Amy about this. Amy denies any
knowledge of the unauthorized Access Point. Amy informs you though that a new friend has
recently visited her, and on numerous occasions, at the company premises. Select the type of
attack that was launched against Certkiller .com.
Select the correct answer from below.
Wireless access of clients to the Certkiller .com network has to be secured as Certkiller .com is in
a large office complex. The best way to do this would be ______. Select the correct answer from
below.
Which of the following actions should be taken to resolve this problem?
A user tells you that he can no longer access some of his files. He can still se the files but not
open them. Which of the following actions should be taken to resolve this problem?
Which of the following passwords should be set in the BIOS to restrict access?
You are working as a network technician at Certkiller .com. You are asked to install a couple of
workstations that will be standing in public part of the company reception for guests to use. Which
of the following passwords should be set in the BIOS to restrict access?
Which of the following could you use in order to reset the password in the BIOS?
You are working as a technician at Certkiller .com. You need to modify some BIOS settings on a
computer, but the BIOS is password protected and the former technician left the company 2 years
ago. Which of the following could you use in order to reset the password in the BIOS?
What would you set in order to protect the CMOS settings within the BIOS?
You are working as a technician at Certkiller .com. You are asked to secure the computers in the
HR department with BIOS passwords. What would you set in order to protect the CMOS settings
within the BIOS?
What would you do in order to meet his request?
You are working as a technician at Certkiller .com. Your boss has received a new laptop and asks
you to ensure that all existing data is permanently removed from the old computers hard drive.
What would you do in order to meet his request?