A technician wants to add wireless guest capabilities to an enterprise wireless network that is currently implementing 802.1X EAP-TLS The guest network must
* Support client Isolation.
* Issue a unique encryption key to each client.
* Allow guests to register using their personal email addresses
Which of the following should the technician implement? (Select TWO),
A. EAP-PEAP
B. Captive portal
C. WPA2-PSK
D. P12 certificate format
E. A separate guest SSID
F. RADIUS Federation
正解:B,F
質問 2:
An email systems administrator is configuring the mail server to prevent spear phishing attacks through email messages. Which of the following refers to what the administrator is doing?
A. Risk avoidance
B. Risk transference
C. Risk acceptance
D. Risk mitigation
正解:D
質問 3:
Which of the following serves to warn users against downloading and installing pirated software on company devices?
A. BPA
B. AUP
C. ISA
D. NDA
正解:B
質問 4:
When conducting a penetration test, a pivot is used to describe a scenario in which:
A. the penetration tester is able to access the datacenter or network closet by using a lockpick
B. a penetration tester is able to download the Active Directory database after exploiting an unpatched vulnerability on the domain controller
C. the vulnerability scanner reveals a flaw in SMB signing, which can be used to send a netcat recon tool to one of the servers on the network.
D. the penetration tester uses pass-the-hash to gam access to a server via SMB, and then uses this server to SSH to another server
正解:D
質問 5:
A security administrator has received multiple calls from the help desk about customers who are unable to access the organization's web server. Upon reviewing the log files the security administrator determines multiple open requests have been made from multiple IP addresses, which is consuming system resources. Which of the following attack types does this BEST describe?
A. DDoS
B. Logic bomb
C. Zero day
D. DoS
正解:A
質問 6:
An organization's research department uses workstations in an air-gapped network. A competitor released products based on files that originated in the research department. Which of the following should management do to improve the security and confidentiality of the research files?
A. Implement multifactor authentication on the workstations.
B. Configure removable media controls on the workstations.
C. Install a web application firewall in the research department.
D. Install HIDS on each of the research workstations.
正解:B