Which of the following formats should the technician use?

A security administrator receives a request from a customer for certificates to access servers securely. The customer would like a single encrypted file that supports PKCS and contains the private key. Which of the following formats should the technician use?A . PEMB . DERC . P12D . PFXView AnswerAnswer: C

June 30, 2020 No Comments READ MORE +

Which of the following should the administrator do NEXT to enforce this new configuration?

A systems administrator wants to disable the use of usernames and passwords for SSH authentication and enforce key-based authentication. Which of the following should the administrator do NEXT to enforce this new configuration?A . Issue a public/private keypair for each user and securely distribute a private key to each employeeB...

June 30, 2020 No Comments READ MORE +

Which of the following would be the BEST way to improve the metrics for the next exercise?

During a company-sponsored phishing exercise, more than 25%of the employees clicked on the link embedded in the message. Of the employees who clicked the link, 75%then entered their user credentials on the website provided. Which of the following would be the BEST way to improve the metrics for the next...

June 29, 2020 No Comments READ MORE +

Which of the following is the BEST solution for the law office?

A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquarters. The telecommunications company has decided to discontinue its dark fiber product and is offering an MPLS connection, which the law office feels is too expensive. Which of the following...

June 29, 2020 No Comments READ MORE +

Which of the following impacts are associated with vulnerabilities in embedded systems? Select TWO

Which of the following impacts are associated with vulnerabilities in embedded systems? Select TWOA . Repeated exploitation due to un patch able firmwareB . Denial of service due to an integrated legacy operating systemC . Loss of inventory accountability due to device deploymentD . Key reuse and collision issues due...

June 28, 2020 No Comments READ MORE +

Which of the following BEST explains the difference between a credentialed scan and a non-credentialed scan?

Which of the following BEST explains the difference between a credentialed scan and a non-credentialed scan?A . A credentialed scan sees devices in the network, including those behind NAT, while a non-credentialed scan sees outward-facing applications.B . A credentialed scan will not show up in system logs because the scan...

June 28, 2020 No Comments READ MORE +

Which of the following BEST describes the staging environment where sandbox coding and proof of concept are deployed?

Which of the following BEST describes the staging environment where sandbox coding and proof of concept are deployed?A . DevelopmentB . Quality assuranceC . ProductionD . SaaSView AnswerAnswer: B

June 27, 2020 No Comments READ MORE +

Which of the following configurations should the engineer choose?

A systems engineer is configuring a wireless network. The network must not require installation of third-party software. Mutual authentication of the client and the server must be used. The company has an internal PKI. Which of the following configurations should the engineer choose?A . EAP-TLSB . EAP-TTLSC . EAP-FASTD ....

June 26, 2020 1 Comment READ MORE +

Which of the following commands should the penetration tester use to verify if this vulnerability exists?

A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener. Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.)A . tcpdumpB . ncC . nmapD . nslookupE . tailF . tracertView...

June 24, 2020 No Comments READ MORE +

Which of the following tools should the penetration testers use to learn more about the content of this file?

A company has a team of penetration testers. This team has located a file on the company file server that they believe contains cleartext usernames followed by a hash. Which of the following tools should the penetration testers use to learn more about the content of this file?A . Exploitation...

March 31, 2020 No Comments READ MORE +