Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol,
which can utilize EAP. Which of the following would BEST fit her objective?
Ann, a security administrator, has concerns regarding her company's wireless network. The network is
open and available for visiting prospective clients in the conference room, but she notices that many more
devices are connecting to the network than should be.
Which of the following would BEST alleviate Ann's concerns with minimum disturbance of current
functionality for clients?
Joe analyzed the following log and determined the security team should implement which of the following as
a mitigation method against further attempts?
Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local [00: 00: 03]Unsuccessful Login: 022 214.34.56.006
: RDP 192.168.1.124 [00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124 [00: 00: 07]
UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124 [00: 00: 08]UnSuccessful Login: 003
214.34.56.006 : RDP 192.168.1.124
A computer supply company is located in a building with three wireless networks. The system security team
implemented a quarterly security scan and saw the following.
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?
A systems administrator has implemented PKI on a classified government network. In the event that a
disconnect occurs from the primary CA, which of the following should be accessible locally from every site
to ensure users with bad certificates cannot gain access to the network?
While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make
sure that only devices authorized to access the network would be permitted to login and utilize resources.
Which of the following should the administrator implement to ensure this happens?
Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be accessed
using the same password. The company's network device security policy mandates that at least one virtual
terminal have a different password than the other virtual terminals. Which of the following sets of
commands would meet this requirement?
Ann has read and write access to an employee database, while Joe has only read access. Ann is leaving
for a conference. Which of the following types of authorization could be utilized to trigger write access for
Joe when Ann is absent?