1.
Which of the following combines authentication and authorization, and does not use the TCP protocol?
2.
Which of the following occurs when two access points share the same SSID broadcast where one access point is used to capture data?
3.
Pete and Jane, users in a financial office are reporting that they are not being asked for credentials anymore when successfully connecting to the company
wireless. All other offices are still being authenticated on the wireless. Which of the following is this an example of?
4.
Which of the following is BEST described by a scenario where management chooses to implement security controls to lessen the impact of a given risk?
5.
A recent network attack caused several random computers to malfunction, even though those computers had the latest updates and patches applied. Which of the
following describes this type of attack?

 
6.
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch
her PC is compromised via the tethered connection and corporate data is stolen. Which of the following would BEST prevent this from occurring again?
7.
Sara makes a phone call to the help desk pretending to be Jane. Sara states that she has forgotten her password and asks that it be reset to 12345. Which of the
following is Sara performing?
8.
Which of the following default network ports is used by FTP?
9.
A company recently installed a load balancer for their servers. The company is MOST concerned with:
10.
Which of the following pseudocodes MOST likely prevents buffer overflows?