Which of the following actions should the user take?
A user accesses a retailer from an Internet search. While browsing the retailer’s web site, the user
wants to purchase an item and enters the credit card information. The user later observes
unknown charges on the credit card bill and has not received the purchased items. Which of the
following actions should the user take?
Which of the following protocols is used by Encapsulating Security Payload (ESP) in IPSec?
Which of the following protocols is used by Encapsulating Security Payload (ESP) in IPSec?
Which of the following are components of host hardening?
Which of the following are components of host hardening? (Select TWO)
Which of the following is MOST likely the cause?
An SMTP server is the source of email spam in an organization. Which of the following is MOST
likely the cause?
Which of the following would be the BEST step to take to stop unauthorized users from targeting a wireless net
Which of the following would be the BEST step to take to stop unauthorized users from targeting a
wireless network with a site survey? (Select TWO).
Which of the following would be the BEST action for the employee to take?
An employee receives a request from a person claiming to be an employee at a remote office
location. The caller is knowledgeable about the company and the caller’s name is listed in the
company telephone and email directory; however, the caller claims there is an emergency and
asks that the request be expedited. Which of the following would be the BEST action for the
employee to take?
The first step in effectively implementing a firewall is:
The first step in effectively implementing a firewall is:
Which of the following logs shows when the workstation was last shutdown?
Which of the following logs shows when the workstation was last shutdown?
Which of the following would be an effective way to ensure that a compromised PKI key can not access a system?
Which of the following would be an effective way to ensure that a compromised PKI key can not
access a system?
Which of the following describes an unauthorized user redirecting wireless network traffic from the intended a
Which of the following describes an unauthorized user redirecting wireless network traffic from the
intended access point to a laptop to inject a packet with malware?