A distributed denial of service attack can BEST be described as:
A distributed denial of service attack can BEST be described as:
which of the following as a mitigation method against further attempts?
Joe analyzed the following log and determined the security team should implement which of
the following as a mitigation method against further attempts?
Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local
[00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124
[00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124
[00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124
[00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124
Which of the following is this an example of?
A computer supply company is located in a building with three wireless networks. The
system security team implemented a quarterly security scan and saw the following.
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?
which of the following should be accessible locally from every site to ensure users with bad certificates cann
A systems administrator has implemented PKI on a classified government network. In the
event that a disconnect occurs from the primary CA, which of the following should be
accessible locally from every site to ensure users with bad certificates cannot gain access to
the network?
Which of the following should the administrator implement to ensure this happens?
While configuring a new access layer switch, the administrator, Joe, was advised that he
needed to make sure that only devices authorized to access the network would be permitted
to login and utilize resources. Which of the following should the administrator implement to
ensure this happens?
Which of the following should be executed on the router to prevent access via these ports?
A vulnerability assessment indicates that a router can be accessed from default port 80 and
default port 22. Which of the following should be executed on the router to prevent access
via these ports? (Select TWO).
Which of the following sets of commands would meet this requirement?
Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can
be accessed using the same password. The company’s network device security policy
mandates that at least one virtual terminal have a different password than the other virtual
terminals. Which of the following sets of commands would meet this requirement?
Which of the following could the technician use to prepare the report?
Joe, an employee, was escorted from the company premises due to suspicion of revealing
trade secrets to a competitor. Joe had already been working for two hours before leaving the
premises. A security technician was asked to prepare a report of files that had changed
since last night’s integrity scan. Which of the following could the technician use to prepare
the report? (Select TWO).
Which of the following types of authorization could be utilized to trigger write access for Joe when Ann is ab
Ann has read and write access to an employee database, while Joe has only read access.
Ann is leaving for a conference. Which of the following types of authorization could be
utilized to trigger write access for Joe when Ann is absent?
which of the following is a security control that should be in place?
Human Resources suspects an employee is accessing the employee salary database. The
administrator is asked to find out who it is. In order to complete this task, which of the
following is a security control that should be in place?