An organization uses multifactor authentication to restrict local network access. It requires a PIV and a PIN. Which of the following factors is the organization using?
A. Something you have; something you are
B. Something you do, something you are
C. Something you have, something you know
D. Something you know, something you do
正解:C
質問 2:
A Chief Information Officer (CIO) wants to eliminate the number of calls help desk is receiving for password resets when users log on to internal portals. Which of the following is the BEST solution?
A. Implement a self-service portal
B. Decrease lockout threshold
C. Increase password length
D. Deploy mandatory access control
正解:D
質問 3:
A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?
A. Enable MAC address filtering.
B. Create a site-to-site VPN.
C. Install a firewall and create a DUZ
D. Implement VLANs and an ACL.
正解:A
質問 4:
Which of the following cloud models is used to share resources and information with business partners and like businesses without allowing everyone else access?
A. Community
B. Public
C. Hybrid
D. Private
正解:A
質問 5:
Which of the following would be MOST effective at stopping zero-day attacks on an endpoint? (Select TWO)
A. Removing administrator rights from users
B. Deploying antivirus and anti-malware system tools
C. Installing a reverse proxy
D. Implementing application whitelisting
E. Implementing a web application firewall
F. Deploying multivendor NGFWs
正解:A,D
質問 6:
A technician is implementing 802 1X with dynamic VLAN assignment based on a user Active Directory group membership Which of the following configurations supports the VLAN definitions?
A. RADIUS attribute
B. LDAP path
C. SAML tag
D. Shibboleth IdP
正解:C
質問 7:
Which of the following generates reports that show the number of systems that are associated with POODLE, 3DES, and SMBv1 listings?
A. A vulnerability scanner
B. A UTM appliance
C. A honeypot
D. A protocol analyzer
正解:A