Which of the following protocols would be required to accomplish this?

A company is deploying a wireless network. It is a requirement that client devices must use X.509 certifications to mutually authenticate before connecting to the wireless network. Which of the following protocols would be required to accomplish this?A . EAP-TTLSB . EAP-MD5C . LEAPD . EAP-TLSE . EAP-TOTPView AnswerAnswer: D

January 2, 2021 No Comments READ MORE +

Which of the following security concerns need to be identified and mitigated?

A security administrator is investigating a report that a user is receiving suspicious emails. The user’s machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Choose two.)A . VishingB . WhalingC . Spear phishingD . PharmingE . War dialingF ....

January 1, 2021 No Comments READ MORE +

Which of the following certicate types should the developer install if the company is MOST interested in minimizing costs?

A developer is building a new web portal for internal use. The web portal will only the accessed by internal users and will store operational documents. Which of the following certicate types should the developer install if the company is MOST interested in minimizing costs?A . WildcardB . Code signingC...

January 1, 2021 No Comments READ MORE +

Which of the following should the technician implement?

A technician is required to congure updates on a guest operating system while maintaining the ability to quickly revert the changes that were made while testing the updates. Which of the following should the technician implement?A . SnapshotsB . Revert to known stateC . Rollback to known congurationD . Shadow...

January 1, 2021 No Comments READ MORE +

Which of the following should the security analyst request NEXT based on the UTM firewall analysis?

The application team within a company is asking the security team to investigate why its application is slow after an upgrade. The source of the team's application is 10.13.136.9. and the destination IP is 10.17.36.5. The security analyst pulls the logs from the endpoint security software but sees nothing is...

January 1, 2021 No Comments READ MORE +

Which of the following would be the SAFEST next step to address the issue?

After deploying an antivirus solution on some network-isolated industrial computers, the service desk team received a trouble ticket about the following message being displayed on then computer’s screen: Which of the following would be the SAFEST next step to address the issue?A . Immediately delete the detected file from the...

January 1, 2021 No Comments READ MORE +

Which of the following implements a lossy algorithm?

Which of the following implements a lossy algorithm?A . BlowfishB . ROT13C . Diffie-HellmanD . SHAView AnswerAnswer: D

January 1, 2021 No Comments READ MORE +

Which of the following measurements do these users fall under?

A company recently installed fingerprint scanners at all entrances to increase the facility’s security. The scanners were installed on Monday morning, and by the end of the week it was determined that 1.5% of valid users were denied entry. Which of the following measurements do these users fall under?A ....

January 1, 2021 No Comments READ MORE +

Which of the following cloud models would BEST meet the needs of the organization?

To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?A . MaaSB . IaaSC . SaaSD ....

January 1, 2021 No Comments READ MORE +

Which of the following should the technician use to validate this assumption?

A technician, who is managing a secure B2B connection, noticed the connection broke last night. All networking equipment and media are functioning as expected, which leads the technician to question certain PKI components. Which of the following should the technician use to validate this assumption? (Choose two.)A . PEMB ....

December 31, 2020 No Comments READ MORE +