Which of the following is this attack called?
Joe a system administrator receives reports that users attempting to reach the corporate website
are arriving at an unfamiliar website instead. An investigation by a forensic analyst found that the
name server log has several corporate IP addresses that were changed using Joe’s credentials.
Which of the following is this attack called?
Which of the following would address this?
Joe a technician initiated scans if the company’s 10 routers and discovered that half if the routers
were not changed from their default configuration prior installed on the network. Which of the
following would address this?
which of the following?
An employee attempts to go to a well-known bank site using the company-standard web browser
by correctly typing in the address of the site into the web browser. The employee is directed to a
website that looks like the bank’s site but is not the actual bank site. The employee’s user name
and password are subsequently stolen. This is an example of which of the following?
Which of the following authentication types has been utilized?
A user authenticates to a local directory server. The user then opens a virtualization client to
connect to a virtual server. Instead of supplying a username/password combination, the user
simply checks a use directory credentials checkbox to authenticate to the virtual server. Which of
the following authentication types has been utilized?
Which of the following security controls did the Chief Security Officer implement to BEST meet these requireme
The new Chief Information Officer (CIO) of company ABC, Joe has noticed that company XWY is
always one step ahead with similar products. He tasked his Chief Security Officer to implement
new security controls to ensure confidentiality of company ABC’s proprietary data and complete
accountability for all data transfers. Which of the following security controls did the Chief Security
Officer implement to BEST meet these requirements? (Select Two)
Which of the following reasons allowed the penetration tester to access the server room?
A worker dressed in a fire suppression company’s uniform asks to be let into the server room to
perform the annual check in the fire extinguishers. The system administrator allows the worker into
the room, only to discover hours later that the worker was actually a penetration tester. Which of
the following reasons allowed the penetration tester to access the server room?
Which of the following prevents an attacker from learning authorized MAC addresses?
A company uses port security based on an approved MAC list to secure its wired network and
WPA2 to secure its wireless network. Which of the following prevents an attacker from learning
authorized MAC addresses?
Which of the following should the technician implement?
A security technician is implementing PKI on a Network. The technician wishes to reduce the
amount of bandwidth used when verifying the validity of a certificate. Which of the following should
the technician implement?
Which of the following should the manager select to BEST detect and provide notification of these occurrences?
The network security manager has been notified by customer service that employees have been
sending unencrypted confidential information via email. Which of the following should the manager
select to BEST detect and provide notification of these occurrences?
Which of the following should the administrator do to accommodate all devices and provide the MOST security?
While troubleshooting a new wireless 802.11 ac network an administrator discovers that several of
the older systems cannot connect. Upon investigation the administrator discovers that the older
devices only support 802.11 and RC4. The administrator does not want to affect the performance
of the newer 802.11 ac devices on the network. Which of the following should the administrator do
to accommodate all devices and provide the MOST security?