Which of the following is required?
An engineer is configuring a wireless network using PEAP for the authentication protocol. Which of the following is required?A . 802.11n support on the WAPC . 509 certificate on the serverD . CCMP support on the network switchE . TLS 1.0 support on the clientView AnswerAnswer: B
Which of the following would offer the BEST protection against offline brute force attacks?
A security administrator is choosing an algorithm to generate password hashes. Which of the following would offer the BEST protection against offline brute force attacks?A . MD5B . 3DESC . AESD . SHA-1View AnswerAnswer: D
Which of the following can be used to increase the time needed to brute force a hashed password?
Which of the following can be used to increase the time needed to brute force a hashed password?A . BCRYPTB . ECDHEC . Elliptic curveD . Diffie-HellmanView AnswerAnswer: C
Which of the following should the IT administrator do FIRST after recovery?
A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants lo ensure il does not happen again. Which of the following should the IT administrator do...
Which of the following is MOST likely the cause?
A user is unable to obtain an IP address from the corporate DHCP server. Which of the following is MOST likely the cause?A . Default configurationB . Resource exhaustionC . Memory overflowD . Improper input handlingView AnswerAnswer: B
An organization uses simulated phishing attacks on its users to better prepare them to recognize actual phishing attacks and get them accustomed to reporting the attacks to the security team.
An organization uses simulated phishing attacks on its users to better prepare them to recognize actual phishing attacks and get them accustomed to reporting the attacks to the security team. This is an example of:A . baseliningB . user trainingC . stress testingD . continuous monitoringView AnswerAnswer: B
Which of the following attack types does this BEST describe?
A security administrator has received multiple calls from the help desk about customers who are unable to access the organization's web server. Upon reviewing the log files the security administrator determines multiple open requests have been made from multiple IP addresses, which is consuming system resources. Which of the following...
Which of the following types of attacks occurred?
Joe a new employee, discovered a thumb drive with the company's logo on it while walking in the parking lot Joe was curious as to the contents of the drive and placed it into his work computer. Shortly after accessing the contents, he noticed the machine was running slower, started...
Which of the following would be the BEST combination to reduce the risks discovered?
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection contains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30%...
Which of the following is the next BEST course of action the administrator should take?
A new network administrator is establishing network circuit monitoring guidelines to catch potentially malicious traffic. The administrator begins monitoring the NetFlow statistics tor the critical Internet circuit and notes the following data after two weeks. However, after checking the statistics from the weekend following the compiled statistics the administrator notices...