A) 802.1X
B) 802.3
C) LDAP
D) TKIP
E) CCMP
F) WPA2-PSK
Correct Answer
verified
Multiple Choice
A) Configure IPSec in transport mode.
B) Configure server-based PKI certificates.
C) Configure the GRE tunnel.
D) Configure a site-to-site tunnel.
Correct Answer
verified
Multiple Choice
A) Key escrow
B) A self-signed certificate
C) Certificate chaining
D) An extended validation certificate
Correct Answer
verified
Multiple Choice
A) Enable IPSec and configure SMTP.
B) Enable SSH and LDAP credentials.
C) Enable MIME services and POP3.
D) Enable an SSL certificate for IMAP services.
Correct Answer
verified
Multiple Choice
A) Network latency is causing remote desktop service request to time out
B) User1 has been locked out due to too many failed passwords
C) Lack of network time synchronization is causing authentication mismatches
D) The workstation has been compromised and is accessing known malware sites
E) The workstation host firewall is not allowing remote desktop connections
Correct Answer
verified
Multiple Choice
A) RAID 1
B) RAID 5
C) RAID 6
D) RAID 10
Correct Answer
verified
Multiple Choice
A) Hash function
B) Elliptic curve
C) Symmetric algorithm
D) Public key cryptography
Correct Answer
verified
Multiple Choice
A) Elasticity
B) Scalability
C) High availability
D) Redundancy
Correct Answer
verified
Multiple Choice
A) Block level encryption
B) SAML authentication
C) Transport encryption
D) Multifactor authentication
E) Predefined challenge questions
F) Hashing
Correct Answer
verified
Multiple Choice
A) Secure USB drive
B) Cable lock
C) Hardware OTP token
D) HASP key
Correct Answer
verified
Multiple Choice
A) CA public key
B) Server private key
C) CSR
D) OID
Correct Answer
verified
Multiple Choice
A) Black box
B) Regression
C) White box
D) Fuzzing
Correct Answer
verified
Multiple Choice
A) Remote exploit
B) Amplification
C) Sniffing
D) Man-in-the-middle
Correct Answer
verified
Multiple Choice
A) Create a hash of the hard drive.
B) Export the Internet history.
C) Save a copy of the case number and date as a text file in the root directory.
D) Back up the pictures directory for further inspection.
Correct Answer
verified
Multiple Choice
A) Require the use of an eight-character PIN.
B) Implement containerization of company data.
C) Require annual AUP sign-off.
D) Use geofencing tools to unlock devices while on the premises.
Correct Answer
verified
Multiple Choice
A) DNSSEC
B) SFTP
C) nslookup
D) dig
Correct Answer
verified
Multiple Choice
A) Separation of duties
B) Time-of-day restrictions
C) Permission auditing
D) Mandatory access control
Correct Answer
verified
Multiple Choice
A) Tunnel mode
B) Transport mode
C) AH-only mode
D) ESP-only mode
Correct Answer
verified
Multiple Choice
A) Schredding
B) Pulping
C) Deidentifying
D) Recycling
Correct Answer
verified
Multiple Choice
A) Mandatory access controls
B) Disable remote login
C) Host hardening
D) Disabling services
Correct Answer
verified
Showing 241 - 260 of 1164
Related Exams