Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?A . WPSB . 802.1xC ....
Which of the following is the MOST likely risk in this situation?
A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation?A . An attacker can access and change the printer configuration.B . SNMP data leaving the printer...
Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?
Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?A . SustainabilityB . HomogeneityC . ResiliencyD . ConfigurabilityView AnswerAnswer: C
Which of the following describes the case in which the tool incorrectly identifies the vulnerability?
An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?A . False negativeB . True negativeC . False positiveD . True positiveView AnswerAnswer: C
Which of the following is the BEST solution for this organization?
An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?A ....
Which of the following should be implemented to provide the MOST secure environment?
A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?A . A perimeter firewall and IDSB . An air gapped computer networkC . A honeypot residing in a DMZD...
Given these requirements, which of the following technologies should the analyst recommend and configure?
A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?A . LDAP servicesB . Kerberos servicesC . NTLM servicesD . CHAP servicesView AnswerAnswer: B...
You have been tasked with designing a security plan for your company
DRAG DROP You have been tasked with designing a security plan for your company. INSTRUCTIONS Drag and drop the appropriate security controls on the floor plan. All objects must be used and all place holders must be filled. Order does not matter. If at any time you would like to...
Which of the following steps should the responder perform NEXT?
An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?A . Capture and document necessary information to assist in the response.B . Request the user capture and provide a...
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?A . Privilege escalationB . PivotingC . Process affinityD . Buffer overflowView AnswerAnswer: A