Which of the following is the MOST likely cause?
A company has recently implemented a high density wireless system by having a junior technician
install two new access points for every access point already deployed. Users are now reporting
random wireless disconnections and slow network connectivity. Which of the following is the
MOST likely cause?
Which of the following is the MOST likely reason for this issue?
A company provides secure wireless Internet access for visitors and vendors working onsite.
Some of the vendors using older technology report that they are unable to access the wireless
network after entering the correct network information. Which of the following is the MOST likely
reason for this issue?
Which of the following controls would BEST mitigate this risk?
A company is looking to reduce the likelihood of employees in the finance department being
involved with money laundering. Which of the following controls would BEST mitigate this risk?
Which of the following should be used to prevent this from occurring again?
A company recently experienced data loss when a server crashed due to a midday power outage.
Which of the following should be used to prevent this from occurring again?
which of the following would BEST assist Joe with detecting this activity?
Joe, a security administrator, is concerned with users tailgating into the restricted areas. Given a
limited budget, which of the following would BEST assist Joe with detecting this activity?
which of the following types of security control?
It is important to staff who use email messaging to provide PII to others on a regular basis to have
confidence that their messages are not intercepted or altered during transmission. They are
concerned about which of the following types of security control?
which of the following security controls?
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The
manager is concerned with which of the following security controls?
Which of the following technologies was MOST likely being used to generate this log?
A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: */*
Referrer: http://localhost/
*******
HTTP/1.1 403 Forbidden
Connection: close
Log: Access denied with 403. Pattern matches form bypass
Which of the following technologies was MOST likely being used to generate this log?
which of the following controls should be used?
A security team has identified that the wireless signal is broadcasting into the parking lot. To
reduce the risk of an attack against the wireless network from the parking lot, which of the
following controls should be used? (Select TWO).
Which of the following methods would BEST accomplish this goal?
An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to integrate the security controls of some of the network devices in the
organization. Which of the following methods would BEST accomplish this goal?