Which of the following forms of software testing can be…
Which of the following forms of software testing can best be performed with no knowledge of how a system is internally structured or functions? (Select Two.)
Which of the following describes the implementation of PAT?
Which of the following describes the implementation of PAT?
Which of the following allows wireless use while mitiga…
In the course of troubleshooting wireless issues from users a technician discovers that users are connecting to their home SSIDs which the technician scans but
detects none of these SSIDs. The technician eventually discovers a rouge access point that spoofs any SSID request. Which of the following allows wireless use
while mitigating this type of attack?
Which of the following reasons make this effective?
An attacker impersonates a fire marshal and demands access to the datacenter under the threat of a fine. Which of the following reasons make this effective?
(Select two.)
Which of the following, when implemented and configured…
The chief information officer (CIO) of a major company intends to increase employee connectivity and productivity by issuing employees mobile devices with access
to their enterprise email, calendar, and contacts. The solution the CIO intends to use requires a PKI that automates the enrollment of mobile device certificates.
Which of the following, when implemented and configured securely, will meet the CIO’s requirement?
Which of the following forms of malware is best describ…
During a routine configuration audit, a systems administrator determines that a former employee placed an executable on an application server. Once the system
was isolated and diagnosed, it was determined that the executable was programmed to establish a connection to a malicious command and control server. Which
of the following forms of malware is best described in the scenario?
Which of the following would prevent FTP traffic from r…
Given the following set of firewall rules:
From the inside to outside allow source any destination any port any From inside to dmz allow source any destination any port tcp-80 From inside to dmz allow
source any destination any port tcp-443 Which of the following would prevent FTP traffic from reaching a server in the DMZ from the inside network?
Which of the following should the manager choose to BES…
A network manager needs a cost-effective solution to allow for the restoration of information with a RPO of 24 hours. The disaster recovery plan also requires that
backups occur within a restricted timeframe during the week and be take offsite weekly. Which of the following should the manager choose to BEST address these
requirements?
Which of the following is a best practice when setting …
Which of the following is a best practice when setting up a client to use the LDAPS protocol with a server?
Which of the following would still need to be performed?
A user, Ann, has been issued a smart card and is having problems opening old encrypted email. Ann published her certificates to the local windows store and to the
global address list. Which of the following would still need to be performed?