what technologies should the authentication protocol be changed to?
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the
authenticator. Which of the following is configured in the RADIUS server and what technologies
should the authentication protocol be changed to?
what technologies should the authentication protocol be changed to?
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the
authenticator. Which of the following is configured in the RADIUS server and what technologies
should the authentication protocol be changed to?
which already deploys full disk encryption?
Which of the following is an advantage of implementing individual file encryption on a hard drive
which already deploys full disk encryption?
Which of the following BEST describes this arrangement?
An IT director is looking to reduce the footprint of their company’s server environment. They have
decided to move several internally developed software applications to an alternate environment,
supported by an external company. Which of the following BEST describes this arrangement?
Which of the following types of controls is being used?
A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at
the site were facing the wrong direction to capture the incident. The analyst ensures the cameras
are turned to face the proper direction. Which of the following types of controls is being used?
Which of the following protocols should be used in this scenario?
A security administrator wishes to change their wireless network so that IPSec is built into the
protocol and NAT is no longer required for address range extension. Which of the following
protocols should be used in this scenario?
Which of the following processes is being followed to ensure application integrity?
The network administrator is responsible for promoting code to applications on a DMZ web server.
Which of the following processes is being followed to ensure application integrity?
which of the following types of testing?
An IT auditor tests an application as an authenticated user. This is an example of which of the
following types of testing?
(Select TWO).
The manager has a need to secure physical documents every night, since the company began
enforcing the clean desk policy. The BEST solution would includE. (Select TWO).
Which of the following is an important implementation consideration when deploying a wireless network that use
Which of the following is an important implementation consideration when deploying a wireless
network that uses a shared password?