Which of the following represents the authentication architecture in use?
A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a supplicant. Which of the following represents the authentication architecture in use?A . Open systems authenticationB . Captive portalC . RADIUS federationD . 802.1xView AnswerAnswer: D
To which of the following categories does the refrigerator belong?
A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS attack. News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to the website that crashed. To which of the following categories does the refrigerator belong?A...
Which of the following encryption methods does PKI typically use to securely protect keys?
Which of the following encryption methods does PKI typically use to securely protect keys?A . Elliptic curveB . Digital signaturesC . AsymmetricD . ObfuscationView AnswerAnswer: C
In this scenario, which of the following will occur when users try to authenticate to the portal?
A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords. The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will...
Which of the following characteristics BEST describes what the CIO has requested?
In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?A . ElasticityB . ScalabilityC . High availabilityD . RedundancyView AnswerAnswer: A...
Which of the following should the administrator implement?
A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?A . DMZB . NATC . VPND . PATView AnswerAnswer: C
Which of the following would BEST accomplish these goals?
A security analyst wishes to increase the security of an FTP server. Currently, all traffic to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modern FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing...
Which of the following technologies BEST supports the deployment of DNSSEC at the organization?
An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment of DNSSEC at the organization?A . LDAPB . TPMC . TLSD . SSLE . PKIView AnswerAnswer: C
Which of the following steps is MOST important in the process of disengagement from this employee?
A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the process of disengagement from this employee?A . Obtain a list of passwords used by the employee.B . Generate a report on outstanding projects the employee handled.C . Have the employee surrender company...
Which of the following is the MOST likely reason the company added this data type?
A company has a data classification system with definitions for “Private” and “Public”. The company’s security policy outlines how data should be protected based on type. The company recently added the data type “Proprietary”. Which of the following is the MOST likely reason the company added this data type?A ....