Which of the following would limit access to the wireless network to only organization-owned devices in the sales department?

A network administrator needs to restrict the users of the company's WAPs to the sales department. The network administrator changes and hides the SSID and then discovers several employees had connected their personal devices to the wireless network. Which of the following would limit access to the wireless network to...

December 25, 2020 No Comments READ MORE +

Which of the following is a security consideration for IoT devices?

Which of the following is a security consideration for IoT devices?A . IoT devices have built-in accounts that users rarely access.B . IoT devices have less processing capabilities.C . IoT devices are physically segmented from each other.D . IoT devices have purpose-built applications.View AnswerAnswer: A

December 25, 2020 No Comments READ MORE +

Which of the following should the analyst do FIRST?

A forensics analyst is investigating a hard drive for evidence of suspected illegal activity. Which of the following should the analyst do FIRST?A . Create a hash of the hard drive.B . Export the Internet history.C . Save a copy of the case number and date as a text file...

December 25, 2020 No Comments READ MORE +

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?A . Integer overflowB . Zero-dayC . End of lifeD . Race conditionView AnswerAnswer: B

December 25, 2020 No Comments READ MORE +

Which of the following is the BEST example of a reputation impact identified during a risk assessment?

Which of the following is the BEST example of a reputation impact identified during a risk assessment?A . A bad software patch taking down the production systems.B . A misconfigured firewall exposing intellectual properly to the internet.C . An attacker defacing the e-commerce portal.D . Malware collecting credentials for company...

December 25, 2020 No Comments READ MORE +

Which of the following configurations supports the VLAN definitions?

A technician is implementing 802 1X with dynamic VLAN assignment based on a user Active Directory group membership. Which of the following configurations supports the VLAN definitions?A . RADIUS attributeB . SAML tagC . LDAP pathD . Shibboleth IdPView AnswerAnswer: B

December 25, 2020 No Comments READ MORE +

Which of the following recommendations should the administrator include in the assessment?

A security administrator is creating a risk assessment on BYOD. One of the requirements of the risk assessment is to address the following • Centrally managing mobile devices • Data loss prevention Which of the following recommendations should the administrator include in the assessment? (Select TWO).A . implement encryption.B ....

December 25, 2020 No Comments READ MORE +

Which of the following is the MOST likely cause for this?

When accessing a popular website, a user receives a warning that the certificate for the website is not valid. Upon investigation, it was noted that the certificate is not revoked and the website is working fine for other users. Which of the following is the MOST likely cause for this?A...

December 24, 2020 No Comments READ MORE +

Which of the following adjustments would be the MOST appropriate for the service account?

A security analyst is reviewing the password policy for a service account that is used for a critical network service. The password policy for this account is as follows: Enforce password history: Three passwords remembered Maximum password age: 30 days Minimum password age: Zero days Complexity requirements: At least one...

December 24, 2020 No Comments READ MORE +

Which of the following is the MOST likely reason?

An attacker is able to capture the payload for the following packet: IP 192.168.1.22:2020 10.10.10.5:443 IP 192.166.1.10:1030 10.10.10.1:21 IP 192.168.1.57:5217 10.10.10.1:3389 During an investigation, an analyst discovers that the attacker was able to capture the information above and use it to log on to other servers across the company. Which...

December 23, 2020 No Comments READ MORE +