1.
A company has remote workers with laptops that house sensitive data. Which of the following can be implemented to recover the laptops if they are lost?
2.
An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
3.
Which of the following reduces the likelihood of a single point of failure when a server fails?
4.
Which of the following is an example of requiring users to have a password that consists of alpha-numeric and two special characters?
5.
Which of the following elements of PKI are found in a browser's trusted root CA?
6.
Which of the following tools can execute a ping sweep?
7.
Which of the following would be used to distribute the processing effort to generate hashes for a password cracking program?
8.
Which of the following will help prevent unauthorized access to a smartphone?
9.
Several classified mobile devices have been stolen. Which of the following would BEST reduce the data leakage threat?
10.
A security administrator is setting up a corporate wireless network using WPA2 with CCMP but does not want to use PSK for authentication. Which of the following could be used to support 802.1x authentication?