1.
Which four options are valid EAP mechanisms to be used with WPA2? (Choose four.)
2.
How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?
3.
Which common Microsoft protocol allows Microsoft machine administration and operates over TCP port 3389?
4.
To prevent a potential attack on a Cisco IOS router with the echo service enabled, what action should you take?
5.
Which query type is required for an nslookup on an IPv6 addressed host?
6.
According to OWASP guidelines, what is the recommended method to prevent cross-site request forgery?
7.
Which option is used to collect wireless traffic passively, for the purposes of eavesdropping or information gathering?
8.
Which traffic class is defined for non-business-relevant applications and receives any bandwidth that remains after QoS policies have been applied?
9.
In the context of a botnet, what is true regarding a command and control server?
10.
Which option is used for anti-replay prevention in a Cisco IOS IPsec implementation?