Which of the following would be MOST appropriate to secure an existing SCADA system by preventing connections
Which of the following would be MOST appropriate to secure an existing SCADA system by
preventing connections from unauthorized networks?
The common method of breaking larger network address space into smaller networks is known as:
The common method of breaking larger network address space into smaller networks is known as:
Which of the following ports MUST be configured to allow active FTP connections?
While securing a network it is decided to allow active FTP connections into the network. Which of
the following ports MUST be configured to allow active FTP connections? (Select TWO).
Which of the following solutions should be implemented?
An administrator needs to secure a wireless network and restrict access based on the hardware
address of the device. Which of the following solutions should be implemented?
Which of the following helps to establish an accurate timeline for a network intrusion?
Which of the following helps to establish an accurate timeline for a network intrusion?
Which of the following is the MOST secure ACL to implement at the company’s gateway firewall?
A security administrator must implement a firewall rule to allow remote employees to VPN onto the
company network. The VPN concentrator implements SSL VPN over the standard HTTPS port.
Which of the following is the MOST secure ACL to implement at the company’s gateway firewall?
This is known as:
A user has plugged in a wireless router from home with default configurations into a network jack
at the office. This is known as:
which of the following should be used for transmitting company documents?
When confidentiality is the primary concern, and a secure channel for key exchange is not
available, which of the following should be used for transmitting company documents?
which of the following?
It is MOST important to make sure that the firewall is configured to do which of the following?
Which of the following is the BEST solution?
An administrator needs to secure RADIUS traffic between two servers. Which of the following is
the BEST solution?