Which of the following should be done to protect the interest of the company?
A company used a partner company to develop critical components of an application. Several
employees of the partner company have been arrested for cybercrime activities. Which of the
following should be done to protect the interest of the company?
Which of the following is a black box testing methodology?
Which of the following is a black box testing methodology?
Which of the following would be MOST appropriate in this scenario?
A security administrator wishes to prevent certain company devices from using specific access
points, while still allowing them on others. All of the access points use the same SSID and wireless
password. Which of the following would be MOST appropriate in this scenario?
Which of the following BEST describes this of attack?
An attacker Joe configures his service identifier to be as an access point advertised on a billboard.
Joe then conducts a denial of service attack against the legitimate AP causing users to drop their
connections and then reconnect to Joe’s system with the same SSID. Which of the following BEST
describes this of attack?
Which of the following may be used with a BNC connector?
Which of the following may be used with a BNC connector?
Which of the following commands would provide the BEST information about the path taken across the network to
A network technician has received comments from several users that cannot reach a particular
website. Which of the following commands would provide the BEST information about the path
taken across the network to this website?
Which of the following would allow the phones to be powered using the network connection?
A technician is configuring a switch to support VOPIP phones. The technician wants to ensure the
phones do not require external power packs. Which of the following would allow the phones to be
powered using the network connection?
Which of the following attacks is occurring?
A technician reports a suspicious individual is seen walking around the corporate campus. The
individual is holding a smartphone and pointing a small antenna, in order to collect SSIDs. Which
of the following attacks is occurring?
Which of the following should be implemented in order to redirect these messages?
Users have reported receiving unsolicited emails in their inboxes, often times with malicious links
embedded. Which of the following should be implemented in order to redirect these messages?
Which of the following should be blocked on the firewall?
A company uses SSH to support internal users. They want to block external SSH connections
from reaching internal machines. Which of the following should be blocked on the firewall?