which of the following ways?
Honeypots and honeynets are different in which of the following ways?
Which of the following security setups does this company employ?
A corporate office recently had a security audit and the IT manager has decided to implement very
strict security standards. The following requirements are now in place for each employee logging
into the network:
Biometric fingerprint scan
Complex 12 character password
5 digit pin code authorization
Randomized security question prompt upon login
Which of the following security setups does this company employ?
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
Which of the following will BEST block a host from accessing the LAN on a network using static IP
addresses?
Which of the following remote access types requires a certificate for connectivity?
Which of the following remote access types requires a certificate for connectivity?
which of the following authentication methods was being used?
A technician is troubleshooting authentication issues on a server. It turns out the clock on the
server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the
scenario, which of the following authentication methods was being used?
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
Which of the following wireless standards uses a block encryption cipher rather than a stream
cipher?
Which of the following can be used to find the key?
A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does
Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?
Which of the following would MOST likely be installed?
A system administrator is implementing an IDS on the database server to see who is trying to
access the server. The administrator relies on the software provider for what to detect. Which of
the following would MOST likely be installed?
Which of the following should have been implemented?
A vendor releases an emergency patch that fixes an exploit on their network devices. The network
administrator needs to quickly identify the scope of the impact to the network. Which of the
following should have been implemented?