Which of the following should the technician do to resolve the connectivity problem?
A technician installed two ground plane antennae on 802.11n bridges connecting two buildings
500 feet apart. After configuring both radios to work at 2.4ghz and implementing the correct
configuration, connectivity tests between the two buildings are unsuccessful. Which of the
following should the technician do to resolve the connectivity problem?
Which of the following should be implemented to help prevent similar incidents in the future?
A company has had several security incidents in the past six months. It appears that the majority
of the incidents occurred on systems with older software on development workstations. Which of
the following should be implemented to help prevent similar incidents in the future?
Which of the following should have been implemented on the router to prevent this attack?
A router was shut down as a result of a DoS attack. Upon review of the router logs, it was
determined that the attacker was able to connect to the router using a console cable to complete
the attack. Which of the following should have been implemented on the router to prevent this
attack? (Select two)
Which of the following is the name for the access control methodology used?
A systems administrator is configuring a new file server and has been instructed to configure
writeable to by the department manager, and read only for the individual employee. Which of the
following is the name for the access control methodology used?
Which of the following are cryptography concepts that should be used to identify the allowed programs?
An administrator is implementing a security control that only permits the execution of allowed
programs. Which of the following are cryptography concepts that should be used to identify the
allowed programs? (Select two.)
Which of the following commands can be used to see processes that are listening on a TCP port?
While responding to an incident on a Linux server, the administrator needs to disable unused
services. Which of the following commands can be used to see processes that are listening on a
TCP port?
Which of the following security controls helps protect the associated publicly accessible API endpoints?
A bank chief information security officer (CISO) is responsible for a mobile banking platform that
operates natively on iOS and Andriod. Which of the following security controls helps protect the
associated publicly accessible API endpoints?
To do this, the security analyst will perform a:
A company is rolling out a new e-commerce website. The security analyst wants to reduce the risk
of the new website being comprised by confirming that system patches are up to date, application
hot fixes are current, and unneeded ports and services have been disabled. To do this, the
security analyst will perform a:
Which of the following is Joe attempting to complete?
Joe, a security analyst, is attempting to determine if a new server meets the security requirements
of his organization. As a step in this process, he attempts to identify a lack of security controls and
to identify common misconfigurations on the server. Which of the following is Joe attempting to
complete?
Which of the following describes how the switch in the classroom should be configured to allow for the virtual
A classroom utilizes workstations running virtualization software for a maximum of one virtual
machine per working station. The network settings on the virtual machines are set to bridged.
Which of the following describes how the switch in the classroom should be configured to allow for
the virtual machines and host workstation to connect to network resources?