Which of the following SSL certificates should the administrator purchase to protect all the websites and be able to administer them easily at a later time?

An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two of the websites share the domain name but have different subdomain prefixes. Which of the following SSL certificates should the administrator purchase to protect all the websites and be able...

February 7, 2021 No Comments READ MORE +

Which of the following BEST describe the controls that were implemented to address this issue?

A manufacturing company updates a policy that instructs employees not to enter a secure area in groups and requires each employee to swipe their badge to enter the area When employees continue to ignore the policy, a mantrap is installed. Which of the following BEST describe the controls that were...

February 7, 2021 No Comments READ MORE +

Which of the following is the MOST likely motivation for a script kiddie threat actor?

Which of the following is the MOST likely motivation for a script kiddie threat actor?A . Financial gainB . NotorietyC . Political expressionD . Corporate espionageView AnswerAnswer: B

February 6, 2021 No Comments READ MORE +

Which of the following network attacks Is the researcher MOST likely experiencing?

A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message: Which of the following...

February 6, 2021 No Comments READ MORE +

Which of the following BEST describes the MDM options the company is using?

A company just implemented a new telework policy that allows employees to use personal devices for official email and file sharing while working from home. Some of the requirements are: • Employees must provide an alternate work location (i.e., a home address). • Employees must install software on the device...

February 6, 2021 No Comments READ MORE +

Which of the following networking concepts would BEST accomplish this?

A network technician is setting up a new branch for a company. The users at the new branch will need to access resources securely as if they were at ‘the main location. Which of the following networking concepts would BEST accomplish this?A . Virtual network segmentationB . Physical network segmentationC...

February 6, 2021 No Comments READ MORE +

Which of the following protocols must be supported by both the RADIUS server and the WAPs?

A systems engineer is setting up a RADIUS server to support a wireless network that uses certificate authentication. Which of the following protocols must be supported by both the RADIUS server and the WAPs?A . CCMPB . TKIPC . WPSD . EAPView AnswerAnswer: D

February 6, 2021 No Comments READ MORE +

Which of the following access control methods should managers use to assign after-hours access to the employees?

Several systems and network administrators are determining how to manage access to a facility and enable managers to allow after-hours access. Which of the following access control methods should managers use to assign after-hours access to the employees?A . Rule-based access controlB . Discretionary access controlC . Mandatory access controlD...

February 6, 2021 No Comments READ MORE +

Which of the following should the developer implement to prevent SSL MITM attacks?

A mobile application developer wants to secure an application that transmits sensitive information. Which of the following should the developer implement to prevent SSL MITM attacks?A . StaplingB . ChainingC . SigningD . PinningView AnswerAnswer: D

February 6, 2021 No Comments READ MORE +

Which of the following should a security engineer employ to fulfill the requirements for the manager?

An organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users have a specific set of tools installed, which they must use to perform their duties. Other tools are not permitted for compliance and tracking...

February 5, 2021 No Comments READ MORE +