Which of the following preventative measures would BEST secure a web server from being port scanned by attacke
Which of the following preventative measures would BEST secure a web server from being port
scanned by attackers publicly?
Which of the following network access security methods ensures communication occurs over a secured, encrypted
Which of the following network access security methods ensures communication occurs over a
secured, encrypted channel, even if the data uses the Internet?
Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows co
Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a
Windows computer?
Which of the following tools could attempt to detect operating system vulnerabilities?
Which of the following tools could attempt to detect operating system vulnerabilities?
Which of the following is the correct firewall rule?
A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the
assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?
Which of the following BEST describes this AP?
A user at a hotel sees two SSIDs; both are called “HotelWireless”. After the PC connects to one of the
APs, the user notices their browser homepage has been changed. Which of the following BEST
describes this AP?
Which of the following security setups does this company employ?
A corporate office recently had a security audit and the IT manager has decided to implement very
strict security standards. The following requirements are now in place for each employee logging
into the network:
Biometric fingerprint scan
Complex 12 character password
5 digit pin code authorization
Randomized security question prompt upon login
Which of the following security setups does this company employ?
Which of the following is needed when using WPA2-Enterprise wireless encryption?
Which of the following is needed when using WPA2-Enterprise wireless encryption?
Which of the following authentication solutions use tickets that include valid credentials to access additiona
Which of the following authentication solutions use tickets that include valid credentials to access
additional network resources?
Which of the following protocols is used to provide secure authentication and encryption over nonsecure networ
Which of the following protocols is used to provide secure authentication and encryption over nonsecure networks?