Which of the following would BEST fit her objective?
Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure
protocol, which can utilize EAP. Which of the following would BEST fit her objective?
Which of the following mitigation strategies is established to reduce risk when performing updates to business
Which of the following mitigation strategies is established to reduce risk when performing updates
to business critical systems?
which of the following as a mitigation method against further attempts?
Joe analyzed the following log and determined the security team should implement which of the
following as a mitigation method against further attempts?
Host 192.168.1.123
[00:00:01]Successful Login: 015 192.168.1.123 : local
[00:00:03]Unsuccessful Login: 022 214.34.56.006 :RDP 192.168.1.124
[00:00:04]UnSuccessful Login: 010 214.34.56.006 :RDP 192.168.1.124
[00:00:07]UnSuccessful Login: 007 214.34.56.006 :RDP 192.168.1.124
[00:00:08]UnSuccessful Login: 003 214.34.56.006 :RDP 192.168.1.124
Which of the following can Pete, a security administrator, use to distribute the processing effort when genera
Which of the following can Pete, a security administrator, use to distribute the processing effort
when generating hashes for a password cracking program?
Which of the following is this an example of?
A computer supply company is located in a building with three wireless networks. The system
security team implemented a quarterly security scan and saw the following. Which of the following
is this an example of?
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with for
Which of the following should Jane, a security administrator, perform before a hard drive is
analyzed with forensics tools?
Which of the following would BEST help Jane when deploying a new access point?
Jane, an administrator, needs to make sure the wireless network is not accessible from the
parking area of their office. Which of the following would BEST help Jane when deploying a new
access point?
Which of the following actions should Joe recommend?
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles
during the week. Further investigation by the system engineering team determined that a timed
.exe file had been uploaded to the system control console during a visit by international
contractors. Which of the following actions should Joe recommend?
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
Which of the following allows Pete, a security technician, to provide the MOST secure wireless
implementation?
Which of the following would provide the strongest protection?
A system administrator has been instructed by the head of security to protect their data at-rest.
Which of the following would provide the strongest protection?