1.
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
2.
Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?
3.
Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?
4.
A security manager must remain aware of the security posture of each system. Which of the following supports this requirement?
5.
Deploying a wildcard certificate is one strategy to:
6.
The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site. Which of the following would need to be implemented?
7.
Which of the following ports is used for SSH, by default?
8.
A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?
9.
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs show repeated connection attempts from the following IPs:
10.10.3.16
10.10.3.23
212.178.24.26
217.24.94.83
These attempts are overloading the server to the point that it cannot respond to traffic. Which of the following attacks is occurring?
10.
Which of the following ciphers would be BEST used to encrypt streaming video?