Which of the following BEST describes the company’s wireless network solution?
Ann a new security specialist is attempting to access the internet using the company’s open
wireless network. The wireless network is not encrypted: however, once associated, ANN cannot
access the internet or other company resources. In an attempt to troubleshoot, she scans the
wireless network with NMAP, discovering the only other device on the wireless network is a
firewall. Which of the following BEST describes the company’s wireless network solution?
Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities ass
Which of the following, if implemented, would improve security of remote users by reducing
vulnerabilities associated with data-in-transit?
Which of the following is considered an environmental control that can be deployed to meet this goal?
A company wants to improve its overall security posture by deploying environmental controls in its
datacenter. Which of the following is considered an environmental control that can be deployed to
meet this goal?
Which of the following should be used to accomplish this task?
A programmer must write a piece of code to encrypt passwords and credit card information used
by an online shopping cart. The passwords must be stored using one-way encryption, while credit
card information must be stored using reversible encryption. Which of the following should be used
to accomplish this task? (Select TWO)
Which of the following should the company implement?
A company needs to provide a secure backup mechanism for key storage in a PKI. Which of the
following should the company implement?
Which of the following supported list of ciphers MUST the security analyst disable?
A security analyst must ensure that the company’s web server will not negotiate weak ciphers with
connecting web browsers. Which of the following supported list of ciphers MUST the security
analyst disable? (Select THREE)
Which of the following concepts is being implemented?
A company’s application is hosted at a data center. The data center provides security controls for
the infrastructure. The data center provides a report identifying serval vulnerabilities regarding out
of date OS patches. The company recommends the data center assumes the risk associated with
the OS vulnerabilities. Which of the following concepts is being implemented?
Which of the following cryptographic methods is most secure for a wireless access point?
Which of the following cryptographic methods is most secure for a wireless access point?
Which of the following is considered an environmental control?
Which of the following is considered an environmental control?
Which of the following Best describes this type of attack?
An attacker Joe configures his service identifier to be the same as an access point advertised on a
billboard. Joe then conducts a denial of service attack against the legitimate AP causing users to
drop their connections and then reconnect to Joe’s system with the same SSID. Which of the
following Best describes this type of attack?