Which of the following would allow the phones to be powered using the network connection?
A technician is configuring a switch to support VOPIP phones. The technician wants to ensure the phones
do not require external power packs. Which of the following would allow the phones to be powered using
the network connection?
Which of the following attacks is occurring?
A technician reports a suspicious individual is seen walking around the corporate campus. The individual
is holding a smartphone and pointing a small antenna, in order to collect SSIDs. Which of the following
attacks is occurring?
Which of the following should be implemented in order to redirect these messages?
Users have reported receiving unsolicited emails in their inboxes, often times with malicious links
embedded. Which of the following should be implemented in order to redirect these messages?
Which of the following should be blocked on the firewall?
A company uses SSH to support internal users. They want to block external SSH connections from
reaching internal machines. Which of the following should be blocked on the firewall?
which of the following administrative control policy considerations MUST be addressed?
If an organization wants to implement a BYOD policy, which of the following administrative control policy
considerations MUST be addressed? (Select two)
Which of the following should the technician implement?
A security technician wants to implement stringent security controls over web traffic by restricting the
client source TCP ports allowed through the corporate firewall. Which of the following should the
technician implement?
Which of the following design elements would be used to segment the network based on organizational groups?
An administrator is configuring a network for all users in a single building. Which of the following design
elements would be used to segment the network based on organizational groups? (Select two)
Which of the following options could improve the safety and security of the datacenter further?
A datacenter has suffered repeated burglaries which led to equipment theft and arson. In the past, the
thieves have demonstrated a determination to bypass any installed safeguards. After mantraps were
installed to prevent tailgating, the thieves crashed through the wall of datacenter with a vehicle after
normal business hours. Which of the following options could improve the safety and security of the
datacenter further? (Select two)
Which of the following can take advantage of man in the middle techniques to prevent data exfiltration?
Which of the following can take advantage of man in the middle techniques to prevent data exfiltration?
Which of the following could be used?
An administrator must select an algorithm to encrypt data at rest. Which of the following could be used?