Which of the following concepts of cryptography is shown?
Given the following: > md5.exe filel.txt > ADIFAB103773DC6A1E6021B7E503A210 > md5.exe file2.txt > ADIFAB103773DC6A1E602lB7E503A210 Which of the following concepts of cryptography is shown?A . CollisionB . SaltingC . SteganographyD . Stream cipherView AnswerAnswer: B
Which of the following should the technician implement?
A technician wants to add wireless guest capabilities to an enterprise wireless network that is currently implementing 802.1X EAP-TLS The guest network must • Support client Isolation. • Issue a unique encryption key to each client. • Allow guests to register using their personal email addresses Which of the following...
Which of the following concepts are described above?
Given the information below: MD5HASH document.doc 049eab40fd36caadlfab10b3cdf4a883 MD5HASH image.jpg 049eab40fd36caadlfab10b3cdf4a883. Which of the following concepts are described above? (Choose two.)A . SaltingB . CollisionC . SteganographyD . HashingE . Key stretchingView AnswerAnswer: B D
Which of the following control types would a backup of server data provide in case of a system issue?
Which of the following control types would a backup of server data provide in case of a system issue?A . CorrectorB . DeterrentC . PreventiveD . DetectiveView AnswerAnswer: A
Which of the following should the manager use to control the network traffic?
After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?A . A DMZB . A VPNC . A VLAND . An ACLView AnswerAnswer: C
Which of the following is the MOST likely reason?
An attacker is able to capture the payload for the following packet: IP 192.168.1.22:2020 10.10.10.5:443 IP 192.166.1.10:1030 10.10.10.1:21 IP 192.168.1.57:5217 10.10.10.1:3389 During an investigation, an analyst discovers that the attacker was able to capture the information above and use it to log on to other servers across the company. Which...
Given that patch management and vulnerability scanners are being used, which of the following would be used to analyze the attack methodology?
A state-sponsored threat actor has launched several successful attacks against a corporate network. Although the target has a robust patch management program in place, the attacks continue in depth and scope, and the security department has no idea how the attacks are able to gain access. Given that patch management...
Which of the following would be MOST appropriate based on the engineer's requirements?
An organization wants to implement a solution that allows for automated logical controls for network defense. An engineer plans to select an appropriate network security component, which automates response actions based on security threats to the network. Which of the following would be MOST appropriate based on the engineer's requirements?A...
Which of the following is the administrator protecting against?
A systems administrator is increasing the security settings on a virtual host to ensure users on one VM cannot access information from another VM. Which of the following is the administrator protecting against?A . VM sprawlB . VM escapeC . VM migrationD . VM sandboxingView AnswerAnswer: B
Which of the following is an AAA solution that will provide the required wireless authentication?
A company wants to provide centralized authentication for its wireless system. The wireless authentication system must integrate with the directory back end. Which of the following is an AAA solution that will provide the required wireless authentication?A . TACACS+B . MSCHAPv2C . RADIUSD . LDAPView AnswerAnswer: C