A company wants to introduce a new enterprise mobility strategy for all users. Which deployment model will the enterprise use if it wants to allow an employee to choose a mobile phone from a company-approved list of devices?
You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
A company wants to allow users to access the network using company-issued tablets. Only approved apps can be installed on the devices. What MDM feature provides the necessary functionality to meet this requirement?
Your company has started allowing personal mobile devices on the company network. When users connect to the company Wi-Fi, a screen appears that describes what they can and cannot do on the network, and prompts them to click to acknowledge their agreement. If a user does not click Yes, he or she is not allowed to connect to the network. This is an example of what?
A company uses a Layer 2 switch to segment a network. Each department is assigned to a separate network segment. The conference room contains a wireless AP. You need to ensure that when a user connects a laptop computer to the wireless AP in the conference room, the user can access only resources in their own VLAN. What should you use?
Which two statements describe the advantages of using the agile the method for application development?(Choose two.)
A company has completed a security audit, which has highlighted some gaps. The report has recommended upgrading some network components. The company has provided the following requirements: * Implement a security device that consolidates multiple functions to protect the network, filter malicious websites, and stop SPAM messages. * Implement a tool to identify malware and security incidents using real-time and historical analysis. Which of the following set of devices and tools is BEST suited for that purpose?
You receive a direct message from a friend on a social network. The message tells you about an offer to receive a $100 gift card if you are one of the first 25 to respond to a survey. You click the link and become infected with malware. Which two attack principles contribute to the effectiveness of this attack? (Choose two.)
Your Web site has been the repeated target of cross-site request forgery (XSIRF) attacks. You want to try to prevent these from occurring. What should you do?
- A. Create a Log Analytics workspace. Add a solution to the workspace. Deploy the Commercial ID key to the devices.
- C. Install the Azure Log Analytics Agent on the devices. Configure the agent with an Azure subscription ID.
Which solution has been implemented to provide higher security in the DH protocol?
Users report that an application is failing and displaying detailed messaging including stack traces, data dumps, and detailed codes. This results from what type of vulnerability?
A company discovers that is has been under attack from an APT for several months. Through which type of attack was the initial breach most likely accomplished?
A set of switches is used to implement a VLAN. Where should you enable loop protection?
Which is at the outermost (topmost) level of a defense in depth strategy?
A competitor learns company secrets by examining the contents of a USB drive that he found in a trash can during a site visit. How can you best mitigate this risk?
A user has arrived at a datacenter and has been challenged by three authentication methods as shown in the exhibit. What is the BEST description of the multifactor authentication policy that is in use?
A company is setting up a small network that will use smart cards for logon. Which authentication protocol provides native support for smart card logon?
A server application is currently under development. It has been discovered that some errors, such as a divide by zero error, can leave the application running in an unstable condition. The application needs to respond more appropriately to errors and generate an error message when they occur. What should you implement?
You are devising an incident management plan What should be the primary goal of the incident management plan for a DoS attack on the company's ecommerce servers?
- C. Identify the vulnerabilities that the attacker exploited. Identify the vulnerabilities that the attacker exploited.
Several employees received e-mails that appeared to be from an online auction site. When the users click on the link, they are prompted for personal information. When you investigate the link, you discover that it does not go to the auction site, but to a duplicate site set up by an attacker. What kind of attack has occurred?
You reconfigure your firewall to support a perimeter network. You deploy two Web servers on the perimeter network. You want to deploy a security tool that can help reconfigure the network automatically in response to detected threats. What should you use?
Which hash algorithm is used by common implementations of CHAP?
What are two advantages of implementing a vendor diversity policy? (Choose two.)
A portion of the results of a recent security audit are shown in the table in the exhibit. What should you do to correct the vulnerability shown in the exhibit?
Which of the following protocols are meant for use with passwords and can help mitigate dictionary and brute-force attacks? (Choose two).
You have deployed PKI within your organization. To meet legal reporting requirements, you need to implement a way to provide decryption keys to a third party on an as-needed basis. What should you do?
You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment? (Choose two.)
A company needs to set up two-factor authentication for a cloud-based application. The authentication should include a one-time use, limited time password that is delivered to the user through the Google Authenticator mobile app. The password should be based on a shared key and the current date and time. What type of authentication should the company use?
An administrator is connected to an access point as shown in the exhibit. Which security mode should the administrator select to configure 802.1x settings?
Tabletop exercises are used during which aspect of business continuity planning (BCP)?
About Individual Course:
|Learning Style||Self-Paced Learning|
|Course Duration||1 Hour|