Which of the following describes the procedure the administrator has performed?
The security administrator runs an rpm verify command which records the MD5 sum, permissions,
and timestamp of each file on the system. The administrator saves this information to a separate
server. Which of the following describes the procedure the administrator has performed?
How can the administrator resolve this?
Users are trying to communicate with a network but are unable to do so. A network administrator
sees connection attempts on port 20 from outside IP addresses that are being blocked. How can
the administrator resolve this?
Which of the following is the MOST likely reason for her failure to enter the data center?
In order to enter a high-security datacenter, users are required to speak the password into a voice
recognition system. Ann a member if the sales department over hears the password and upon
speaks it into the system. The system denies her entry and alerts the security team. Which of the
following is the MOST likely reason for her failure to enter the data center?
which of the following attacks is MOST likely underway if the company wireless network uses the same wireless
Given the following list of corporate access points, which of the following attacks is MOST likely
underway if the company wireless network uses the same wireless hardware throughout?
MACSID
00:01:AB:FA:CD:34Corporate AP
00:01:AB:FA:CD:35Corporate AP
00:01:AB:FA:CD:36Corporate AP
00:01:AB:FA:CD:37Corporate AP
00:01:AB:FA:CD:34Corporate AP
Which of the following can be used to perform this action?
A system administrator has noticed network performance issues and wants to gather performance
data from the gateway router. Which of the following can be used to perform this action?
Which of the following technologies was developed to allow companies to use less-expensive…?
Which of the following technologies was developed to allow companies to use less-expensive
storage while still maintaining the speed and redundancy required in a business environment?
Which of the following ports should be used?
An employee needs to connect to a server using a secure protocol on the default port. Which of
the following ports should be used?
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
Which of the following is replayed during wireless authentication to exploit a weal key
infrastructure?
Which of the following would needs to be created for each user?
A new security policy being implemented requires all email within the organization be digitally
signed by the author using PGP. Which of the following would needs to be created for each user?
Which of the following authentication provides users XML for authorization and authentication?
Which of the following authentication provides users XML for authorization and authentication?