Which of the following should the technician install an…
A technician needs to install software onto company laptops to protect local running services, from external
threats. Which of the following should the technician install and configure on the laptops if the threat is network
based?
Which of the following physical security controls preve…
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
Which of the following would be identified as physical …
During a check of the security control measures of the company network assets, a network administrator is
explaining the difference between the security controls at the company. Which of the following would be
identified as physical security controls? (Select THREE).
Which of the following is the BEST security method to i…
A wireless network technician for a local retail store is installing encrypted access points within the store for
real-time inventory verification, as well as remote price checking capabilities, while employees are away from
the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the
wireless networks. There are a finite known number of approved handheld devices needing to access the
store’s wireless network. Which of the following is the BEST security method to implement on the access
points?
Which of the following should be implemented to reduce …
A company has seen an increase in ransomware across the enterprise. Which of the following should be
implemented to reduce the occurrences?
Which of the following will secure traffic between a we…
A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure
traffic between a web browser and a website?
Which of the following actions should the IT security t…
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their
work computers. Which of the following actions should the IT security team implement to help protect the
network from attack as a result of this new policy?
Which of the following standards should be consulted?
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency
emanations. Which of the following standards should be consulted?
Which of the following is the BEST explanation that des…
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response
from the server. Which of the following is the BEST explanation that describes this scenario?
which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an
example of which of the following attacks?