Which of the following issues could be causing the problem?
After a new RADIUS server is added to the network, an employee is unable to connect to the
company’s WPA2-Enterprise WIFI network, which is configured to prompt for the employee’s
network username and password. The employee reports receiving an error message after a brief
connection attempt, but is never prompted for credentials. Which of the following issues could be
causing the problem?
Which of the following security controls should be implemented to BEST remediate this?
Ann the security administrator has been reviewing logs and has found several overnight sales
personnel are accessing the finance department’s network shares. Which of the following security
controls should be implemented to BEST remediate this?
Which of the following should be in the agreement with the farmer to protect the availability of the network?
A fiber company has acquired permission to bury a fiber cable through a famer’s land. Which of
the following should be in the agreement with the farmer to protect the availability of the network?
The security analyst classifies this as a (N).
The programmer confirms that there is potential for a buffer overflow on one of the data input fields
in a corporate application. The security analyst classifies this as a (N).
Which of the following algorithms support ephemeral modes?
A security technician would like to use ciphers that generate ephemeral keys for secure
communication. Which of the following algorithms support ephemeral modes? (Select TWO)
Which of the following concepts would BEST meet this goal?
A security technician would like an application to use random salts to generate short lived
encryption leys during the secure communication handshake process to increase communication
security. Which of the following concepts would BEST meet this goal?
Which of the following would accomplish this task?
A security administrator wishes to implement a method of generating encryption keys from user
passwords to enhance account security. Which of the following would accomplish this task?
Which of the following ports should be configured?
An administrator needs to allow both secure and regular web traffic into a network. Which of the
following ports should be configured? (Select TWO)
Which of the following practices could be used to increase the security posture during deployment?
A recent audit had revealed weaknesses in the process of deploying new servers and network
devices. Which of the following practices could be used to increase the security posture during
deployment? (Select TWO).
Which of the following areas should be addressed FIRST?
A local hospital with a large four-acre campus wants to implement a wireless network so that
doctors can use tablets to access patients’ medical data. The hospital also wants to provide guest
access to the internet for hospital patients and visitors in select areas. Which of the following areas
should be addressed FIRST?