which of the following is the MOST appropriate hashing algorithm?
When generating a request for a new x.509 certificate for securing a website, which of the
following is the MOST appropriate hashing algorithm?
Which of the following describes the encrypted data?
The administrator installs database software to encrypt each field as it is written to disk. Which of
the following describes the encrypted data?
Which of the following allows an application to securely authenticate a user by receiving credentials from a w
Which of the following allows an application to securely authenticate a user by receiving
credentials from a web domain?
Which of the following should the technician use to view IPv4 packet data on a particular internal network seg
A network technician is trying to determine the source of an ongoing network based attack. Which
of the following should the technician use to view IPv4 packet data on a particular internal network
segment?
Which of the following security measures can the administrator use to help protect the company’s WiFi networ
The security administrator has noticed cars parking just outside of the building fence line. Which of
the following security measures can the administrator use to help protect the company’s WiFi
network against war driving? (Select TWO)
Which of the following would assist the administrator in con-firming the suspicions?
A security administrator suspects that data on a server has been exhilarated as a result of unauthorized remote access. Which of the following would assist the administrator in con-firming the
suspicions? (Select TWO)
Which of the following options will pro-vide the best performance and availability for both the VoIP traffic,
A company is deploying a new VoIP phone system. They require 99.999% uptime for their phone
service and are concerned about their existing data network interfering with the VoIP phone
system. The core switches in the existing data network are almost fully saturated. Which of the
following options will pro-vide the best performance and availability for both the VoIP traffic, as
well as the traffic on the existing data network?
The access the server using RDP on a port other than the typical registered port for the RDP protocol?
A server administrator needs to administer a server remotely using RDP, but the specified port is
closed on the outbound firewall on the network. The access the server using RDP on a port other
than the typical registered port for the RDP protocol?
Which of the following can be used to control specific commands that can be executed on a network infrastructu
Which of the following can be used to control specific commands that can be executed on a
network infrastructure device?
Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificatebased authentication with its users. The company uses SSL-inspecting IDS at its network
boundary and is concerned about the confidentiality of the mutual authentication. Which of the
following model prevents the IDS from capturing credentials used to authenticate users to the new
service or keys to decrypt that communication?