Which of the following could be used to support 802.1x authentication?
A security administrator is setting up a corporate wireless network using WPA2 with CCMP but does not want to use PSK for authentication. Which of the following could be used to support 802.1x authentication?
Which of the following attack types is MOST likely occurring?
A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Which of the following is used when performing a qualitative risk analysis?
Which of the following is used when performing a qualitative risk analysis?
Which of the following does the administrator need to ensure is in place for a cold site?
A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensure is in place for a cold site?
Which of the following is another name for a malicious attacker?
Which of the following is another name for a malicious attacker?
Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Which of the following is a best practice to identify fraud from an employee in a sensitive position?
This is an example of which of the following?
Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Which of the following is the MOST likely cause?
A visitor plugs their laptop into the network and receives a warning about their antivirus being out- of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is the MOST likely cause?
Which of the following describes an applicable security control to mitigate this threat?
A company needs to reduce the risk of employees emailing confidential data outside of the company. Which of the following describes an applicable security control to mitigate this threat?
Which of the following can be implemented to recover the laptops if they are lost?
A company has remote workers with laptops that house sensitive data. Which of the following can be implemented to recover the laptops if they are lost?