Which of the following authentication services uses a default TCP port of 88?
Which of the following authentication services uses a default TCP port of 88?
Which of the following would BEST address these concerns?
A technician has been tasked with installing and configuring a wireless access point for the engineering
department. After the AP has been installed, there have been reports the employees from other
departments have been connecting to it without approval. Which of the following would BEST address
these concerns?
Which of the following are being used?
A company has implemented full disk encryption. Clients must authenticate with a username and
password at a pre-boot level to unlock the disk and again a username and password at the network login.
Which of the following are being used? (Select TWO)
Which of the following principles of social engineering was used to lure Anne into clicking the phishing link
Anne an employee receives the following email:
From: Human Resources
To: Employee
Subject: Updated employee code of conduct
Please click on the following link: http//external.site.com/codeofconduct.exe to review the updated code
of conduct at your earliest convenience.
After clicking the email link, her computer is compromised. Which of the following principles of social
engineering was used to lure Anne into clicking the phishing link in the above email?
Which of the following would resolve the issue?
During a review a company was cited for allowing requestors to approve and implement their own
change request. Which of the following would resolve the issue? (Select TWO)
Which of the following should be enabled in IPSec to allow this?
A security administrator wishes to protect session leys should a private key become discovered. Which of
the following should be enabled in IPSec to allow this?
which of the following stages of the Incident Handling Response?
A workstation is exhibiting symptoms of malware and the network security analyst has decided to remove
the system from the network. This represents which of the following stages of the Incident Handling
Response?
Which of the following would provide the MOST objective results when performing penetration testing for an org
Which of the following would provide the MOST objective results when performing penetration testing
for an organization?
Which of the following would meet this goal?
An administrator would like users to authenticate to the network using only UDP protocols. Which of the
following would meet this goal?
When employing PKI to send signed and encrypted data the individual sending the data must have: (Select TWO)
When employing PKI to send signed and encrypted data the individual sending the data must have:
(Select TWO)