Which of the following encryption methods offers this capability?
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the
same level of encryption strength with a lower key length than is typically necessary. Which of the
following encryption methods offers this capability?
Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile de
Which of the following types of cryptography should be used when minimal overhead is necessary
for a mobile device?
Which of the following should the technician do to gather information about the configuration of the wireless
A security technician is attempting to access a wireless network protected with WEP. The
technician does not know any information about the network. Which of the following should the
technician do to gather information about the configuration of the wireless network?
Which of the following actions should be taken to correct this?
The IT department has installed new wireless access points but discovers that the signal extends
far into the parking lot. Which of the following actions should be taken to correct this?
Which of the following would BEST address this?
Joe, the systems administrator, is setting up a wireless network for his team’s laptops only and
needs to prevent other employees from accessing it. Which of the following would BEST address
this?
Which of the following provides the strongest authentication security on a wireless network?
Which of the following provides the strongest authentication security on a wireless network?
Which of the following is a concern when encrypting wireless data with WEP?
Which of the following is a concern when encrypting wireless data with WEP?
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
which of the following should Pete, an administrator, avoid implementing?
While setting up a secure wireless corporate network, which of the following should Pete, an
administrator, avoid implementing?
Which of the following could the technician use to prepare the report?
Joe, an employee, was escorted from the company premises due to suspicion of revealing trade
secrets to a competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s
integrity scan.
Which of the following could the technician use to prepare the report? (Select TWO).