The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be taken to correct this?
A. Implement WEP encryption on the access points
B. Configure the access points so that MAC filtering is not used
C. Disable the SSID broadcasting
D. Lower the power for office coverage only
正解:D
質問 2:
Corporate IM presents multiple concerns to enterprise IT. Which of the following concerns should Jane, the IT security manager, ensure are under control? (Select THREE).
A. Data leakage
B. Authentication
C. Network loading
D. Compliance
E. Malware
F. Non-repudiation
正解:A,D,E
質問 3:
Which of the following software allows a network administrator to inspect the protocol header in order to troubleshoot network issues?
A. URL filter
B. Switch
C. Packet sniffer
D. Spam filter
正解:C
質問 4:
Which of the following presents the STRONGEST access control?
A. DAC
B. RBAC
C. MAC
D. TACACS
正解:C
質問 5:
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
A. Disable SSID
B. Implement WPA
C. Adjust antenna placement
D. Implement WEP
正解:B
質問 6:
Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?
A. $3,750
B. $15,000
C. $75,000
D. $1,500
正解:A
質問 7:
Which of the following protocols is used to authenticate the client and server's digital certificate?
A. TLS
B. PEAP
C. ICMP
D. DNS
正解:A
質問 8:
Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company's password policy. Which of the following should Pete do NEXT?
A. Ask the application development manager to submit a risk acceptance memo so that the issue can be documented.
B. Inform the Chief Information Officer of non-adherence to the security policy so that the developers can be reprimanded.
C. Contact the Chief Information Officer and ask them to change the company password policy so that the application is made compliant.
D. Tell the application development manager to code the application to adhere to the company's password policy.
正解:D
Tanaka -
合格できました。電子版ももらえて素晴らしい。JK0-018試験用のテキストです。