Which of the following will accomplish this?
Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which
of the following will accomplish this?
Which of the following can be used to stop this traffic while troubleshooting the problem?
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the
following can be used to stop this traffic while troubleshooting the problem?
Which of the following uses SSL encryption?
Which of the following uses SSL encryption?
Which of the following technologies would be used?
A network administrator is responding to a statement of direction made by senior management to
implement network protection that will inspect packets as they enter the network. Which of the
following technologies would be used?
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
Which of the following will BEST block a host from accessing the LAN on a network using static IP
addresses?
which of the following authentication methods was being used?
A technician is troubleshooting authentication issues on a server. It turns out the clock on the server
was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario,
which of the following authentication methods was being used?
Which of the following can be used to find the key?
A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?
Which of the following would MOST likely be installed?
A system administrator is implementing an IDS on the database server to see who is trying to access
the server. The administrator relies on the software provider for what to detect. Which of the
following would MOST likely be installed?
Which of the following is the MOST likely security threat?
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the
following is the MOST likely security threat?
Which of the following security measures would BEST fulfill this need?
The security administrator needs to restrict specific devices from connecting to certain WAPs. Which
of the following security measures would BEST fulfill this need?