Which of the following MUST be implemented to support these requirements?

A system administrator wants to ensure that only authorized devices can connect to the wired and wireless corporate system. Unauthorized devices should beautomatically be placed on a guest network. Which of the following MUST be implemented to support these requirements? (Select TWO). A. Port security B. 802.1X C. Proxy D. VLAN E. NAT Show Answer

Read More

Which of the following MUST be completed on the firewall?

A security administrator has been tasked to only allow traffic from HTTPS and SSH on a segregated network that contains sensitive information. Which of thefollowing MUST be completed on the firewall? A. Allow 22, 143 B. Allow 80, 21 and Deny All C. Allow 443, 22 and Deny All D. Allow 443, 80 Show Answer

Read More

The security manager should set a value of 24 hours for the:

A security manager needs to implement a backup solution as part of the disaster recovery plan. The system owners have indicated that the business cannot affordto lose more than a day of transactions following an event where data would have been restored. The security manager should set a value of 24 hours for the: A. […]

Read More

Which of the following is this an example of?

A company has implemented a public-facing authentication system that uses PKI and extended attributes to allow third-party, web-based application integration.Which of the following is this an example of? (Select THREE). A. Federation B. Two-factor authentication C. Transitive trust D. Trusted OS E. Single sign-on F. TOTP G. MAC Show Answer

Read More

Which of the following could be implemented?

Ann, a security administrator, needs to implement a transport encryption solution that will enable her to detect attempts to sniff packets. Which of the following couldbe implemented? A. Eliptical curve algorithms B. Ephemeral keys C. Quantum cryptography D. Steganography Show Answer

Read More

Which of the following should the employee use to transfer the file?

An organization’s security policy requires secure file transfers to and from internal hosts. An employee is attempting to upload a file using an unsecure method to aLinux-based dedicated file server and fails. Which of the following should the employee use to transfer the file? A. FTP B. HTTPS C. SSL D. SCP E. TLS Show […]

Read More