The access control method that BEST satisfies these obj…
An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and
requires significant overhead. Management would like to simplify the access control and provide user with the ability to determine what permissions should be
applied to files, document, and directories. The access control method that BEST satisfies these objectives is:
Which of the following explains this scenario?
A consultant has been tasked to assess a client’s network. The client reports frequent network outages. Upon viewing the spanning tree configuration, the
consultant notices that an old and slow performing edge switch on the network has been elected to be the root bridge. Which of the following explains this scenario?
Which of the following portions of the company’s mobile…
A new hire wants to use a personally owned phone to access company resources. The new hire expresses concern about what happens to the data on the phone
when they leave the company. Which of the following portions of the company’s mobile device management configuration would allow the company data to be
removed from the device without touching the new hire’s data?
Which of the following should the security administrato…
A company would like to prevent the use of a known set of applications from being used on company computers. Which of the following should the security
administrator implement?
Which of the following is the attacker most likely util…
a malicious attacker has intercepted HTTP traffic and inserted an ASCII line that sets the referrer URL. Which of the following is the attacker most likely utilizing?
Which of the following can affect electrostatic dischar…
Which of the following can affect electrostatic discharge in a network operations center?
Which of the following is a feature that is UNIQUE to K…
A security administrator is evaluating three different services: Radius, Diameter, and Kerberos. Which of the following is a feature that is UNIQUE to Kerberos?
Which of the following is an encryption algorithm that …
A security administrator has been asked to implement a VPN that will support remote access over IPsec Which of the following is an encryption algorithm that
would meet this requirement?
Which of the following is commonly used for federated i…
Which of the following is commonly used for federated identity management across multiple organizations?
which of the following?
The process of applying a salt and cryptographic hash to a password then repeating the process many times is known as which of the following?