Which of the following steps of incident handling has been incorrectly performed?
A network technician was tasked to respond to a compromised workstation. The technician
documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of
the following steps of incident handling has been incorrectly performed?
Which of the following would be identified as physical security controls?
During a check of the security control measures of the company network assets, a network
administrator is explaining the difference between the security controls at the company. Which of
the following would be identified as physical security controls? (Select THREE).
Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which
ports need to be opened to allow remote access to the system. Which of the following should the
technician perform?
which of the following manners would meet the company’s objectives?
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the
DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the
10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners
would meet the company’s objectives?
Which of the following attacks is the user MOST likely using?
A malicious user floods a switch with frames hoping to redirect traffic to the user’s server. Which of
the following attacks is the user MOST likely using?
Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following is a security benefit gained from setting up a guest wireless network?
Which of the following should be implemented to reduce the occurrences?
A company has seen an increase in ransomware across the enterprise. Which of the following should
be implemented to reduce the occurrences?
which of the following?
Before logging into the company network, users are required to sign a document that is to be stored
in their personnel file. This standards and policies document is usually called which of the following?
Which of the following could the technician do for vendors to validate the proper security patch?
A network technician has set up an FTP server for the company to distribute software updates for
their products. Each vendor is provided with a unique username and password for security. Several
vendors have discovered a virus in one of the security updates. The company tested all files before
uploading them but retested the file and found the virus. Which of the following could the
technician do for vendors to validate the proper security patch?
Which of the following should be implemented to securely manage the devices?
A technician wants to securely manage several remote network devices. Which of the following
should be implemented to securely manage the devices?