Which of the following steps should the system administrator implement to address the vulnerability?
A system administrator has noticed vulnerability on a high impact production server. A recent
update was made available by the vendor that addresses the vulnerability but requires a reboot of
the system afterwards. Which of the following steps should the system administrator implement to
address the vulnerability?
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on
Which of the following should be implemented to stop an attacker from mapping out addresses
and/or devices on a network?
Which of the following services are used to support authentication services for several local devices from a c
Which of the following services are used to support authentication services for several local
devices from a central location without the use of tokens?
Which of the following should be used to complete this task?
Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what
services and operating systems are running on the corporate network. Which of the following
should be used to complete this task?
A network administrator has recently updated their network devices to ensure redundancy is in place so that:
A network administrator has recently updated their network devices to ensure redundancy is in
place so that:
which of the following concepts?
A network administrator recently updated various network devices to ensure redundancy
throughout the network. If an interface on any of the Layer 3 devices were to go down, traffic will
still pass through another interface and the production environment would be unaffected. This type
of configuration represents which of the following concepts?
Which credentialtype authentication method BEST fits these requirements?
Matt, a systems security engineer, is determining which credential-type authentication to use
within a planned 802.1x deployment. He is looking for a method that does not require a client
certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credentialtype authentication method BEST fits these requirements?
Which of the following security controls would be implemented to restrict those departments?
A system administrator needs to ensure that certain departments have more restrictive controls to
their shared folders than other departments. Which of the following security controls would be
implemented to restrict those departments?
what the security company might do during a black box test?
Matt, the Chief Information Security Officer (CISO), tells the network administrator that a security
company has been hired to perform a penetration test against his network. The security company
asks Matt which type of testing would be most beneficial for him. Which of the following BEST
describes what the security company might do during a black box test?
which of the following attacks?
A network analyst received a number of reports that impersonation was taking place on the
network. Session tokens were deployed to mitigate this issue and defend against which of the
following attacks?