An attack used to find unencrypted information in network traffic is called:
An attack used to find unencrypted information in network traffic is called:
which of the following encryption factors?
Joe, a network technician, is implementing a wireless network and needs to support legacy devices.
He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of
the following encryption factors? (Select TWO).
which of the following?
The process of restricting internal web traffic to an employee-only website based upon Layer 3
addresses is known as which of the following?
Which of the following attack types is being used if the originating IP address has been spoofed?
Which of the following attack types is being used if the originating IP address has been spoofed?
Which of the following services is required on the network firewall to ensure connectivity?
An organization only has a single public IP address and needs to host a website for its customers.
Which of the following services is required on the network firewall to ensure connectivity?
Which of the following authentication methods is MOST secure?
Which of the following authentication methods is MOST secure?
Which of the following will improve security and MOST likely prevent future breaches?
A SOHO had their wireless network breached on several occasions. The user turned off the SSID and
enabled WEP encryption, but breaches are still occurring. Which of the following will improve
security and MOST likely prevent future breaches?
Which of the following will prevent unauthorized devices from connecting to a network switch?
A network technician has recently discovered rogue devices on their network and wishes to
implement a security feature that will prevent this from occurring. Which of the following will
prevent unauthorized devices from connecting to a network switch?
Which of the following should be mitigated by employing proper coding techniques when developing software?
Which of the following should be mitigated by employing proper coding techniques when
developing software?
Which of the following security appliances would be used to only analyze traffic and send alerts when predefin
Which of the following security appliances would be used to only analyze traffic and send alerts
when predefined patterns of unauthorized traffic are detected on the network?