Which of the following would Mike MOST likely implement?
The lobby of the hotel allows users to plug in their laptops to access the Internet. This network is
also used for the IP based phones in the hotel lobby. Mike, the security engineer, wants to secure
the phones so that guests cannot electronically eavesdrop on other guests. Which of the following
would Mike MOST likely implement?
Which of the following would MOST likely be implemented to meet this security goal?
Jane, the security engineer, is tasked with hardening routers. She would like to ensure that
network access to the corporate router is allowed only to the IT group and from authorized
machines. Which of the following would MOST likely be implemented to meet this security goal?
(Select TWO).
Which of the following can be used to discover if a security attack is occurring on a web server?
Which of the following can be used to discover if a security attack is occurring on a web server?
Which of the following attacks has she just received?
Jane, the CEO, receives an email wanting her to clink on a link to change her username and
password. Which of the following attacks has she just received?
Which of the following would BEST address this?
Pete, the system administrator, wishes to monitor and limit users’ access to external websites.
Which of the following would BEST address this?
Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP
addresses on the internal interface of the firewall to be translated to one public IP address on the
external interface of the same firewall. Which of the following should Sara configure?
Which of the following settings can Jane, the network administrator, implement in the computer lab to ensure t
Which of the following settings can Jane, the network administrator, implement in the computer lab
to ensure that user credentials cannot be captured by the next computer user?
Which of the following documentation should Jane MOST likely review and update?
Jane, a security administrator, is reviewing the company’s official documentation to mitigate the
risk of data loss due to personally owned devices being connected to perform company related
work. Which of the following documentation should Jane MOST likely review and update?
which the system should be restored to service?
After a production outage, which of the following documents contains detailed information on the
order in which the system should be restored to service?
Which of the following protocols will be used to exchange keying material within SSH?
Pete, a security administrator, has implemented SSH across all network infrastructure devices in
the enterprise. Which of the following protocols will be used to exchange keying material within
SSH?