Which of the following would be configured to provide more secure connections?
The security administrator has been tasked to update all the access points to provide a more
secure connection. All access points currently use WPA TKIP for encryption. Which of the
following would be configured to provide more secure connections?
which of the following types of risk mitigation strategies?
After a recent security breach, the network administrator has been tasked to update and backup
all router and switch configurations. The security administrator has been tasked to enforce stricter
security policies. All users were forced to undergo additional user awareness training. All of these
actions are due to which of the following types of risk mitigation strategies?
Which of the following risk mitigation strategies would also need to be implemented to reduce the number of ne
Various network outages have occurred recently due to unapproved changes to network and
security devices. All changes were made using various system credentials. The security analyst
has been tasked to update the security policy. Which of the following risk mitigation strategies
would also need to be implemented to reduce the number of network outages due to unauthorized
changes?
Which of the following concepts is used by digital signatures to ensure integrity of the data?
Which of the following concepts is used by digital signatures to ensure integrity of the data?
what was discovered?
A security analyst discovered data such as images and word documents hidden within different
types of files. Which of the following cryptographic concepts describes what was discovered?
Which of the following concepts describes the use of a one way transformation in order to validate the integri
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
Which of the following cryptographic products would be used to provide the MOST secure environment for the WLA
A network administrator has been tasked with securing the WLAN. Which of the following
cryptographic products would be used to provide the MOST secure environment for the WLAN?
Which of the following algorithms with transport encryption would be implemented to provide the MOST secure we
Recent data loss on financial servers due to security breaches forced the system administrator to
harden their systems. Which of the following algorithms with transport encryption would be
implemented to provide the MOST secure web connections to manage and access these servers?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following types of authentication is being described?
A company requires that a user’s credentials include providing something they know and
something they are in order to gain access to the network. Which of the following types of
authentication is being described?