Which of the following authentication methods is MOST likely being attempted?
A system administrator is using a packet sniffer to troubleshoot remote authentication. The
administrator detects a device trying to communicate to TCP port 49. Which of the following
authentication methods is MOST likely being attempted?
Which of the following can use RC4 for encryption?
Which of the following can use RC4 for encryption? (Select TWO).
Which of the following defines a business goal for system restoration and acceptable data loss?
Which of the following defines a business goal for system restoration and acceptable data
loss?
Which of the following PKI concepts is this escribing?
If Organization A trusts Organization B and Organization B trusts Organization C, then
Organization A trusts Organization C. Which of the following PKI concepts is this escribing?
Which of the following concepts is BEST described as developing a new chain of command in the event of a conti
Which of the following concepts is BEST described as developing a new chain of command
in the event of a contingency?
Which of the following allows a company to maintain access to encrypted resources when employee turnover is hi
Which of the following allows a company to maintain access to encrypted resources when
employee turnover is high?
Which of the following devices will help prevent a laptop from being removed from a certain location?
Which of the following devices will help prevent a laptop from being removed from a certain
location?
Which of the following is the MOST secure protocol to transfer files?
Which of the following is the MOST secure protocol to transfer files?
Which of the following security devices needs to be configured to disable future false alarms?
Suspicious traffic without a specific signature was detected. Under further investigation, it
was determined that these were false indicators. Which of the following security devices
needs to be configured to disable future false alarms?
Which of the following administrative controls should be implemented to BEST achieve this?
A company storing data on a secure server wants to ensure it is legally able to dismiss and
prosecute staff who intentionally access the server via Telnet and illegally tamper with
customer data. Which of the following administrative controls should be implemented to
BEST achieve this?