<< Prev Question Next Question >>

Question 102/207

An organization wants to set up a wireless network in the most secure way. Budget is not a major consideration, and the organization is willing to accept some complexity when clients are connecting. It is also willing to deny wireless connectivity for clients who cannot be connected in the most secure manner. Which of the following would be the MOST secure setup that conforms to the organization's requirements?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (207q)
1 commentQuestion 1: An administrator is beginning an authorized penetration test...
Question 2: A security administrator is investigating a report that a us...
Question 3: An organization discovers that unauthorized applications hav...
Question 4: In a lessons learned report, it is suspected that a well-org...
Question 5: A systems administrator has installed a new UTM that is capa...
Question 6: A manufacturer creates designs for very high security produc...
Question 7: The Chief Information Security Officer (CISO) at a large com...
Question 8: Joe recently assumed the role of data custodian for this org...
Question 9: SIMULATION You have just received some room and WiFi access ...
Question 10: A security team has completed the installation of a new serv...
Question 11: Fuzzing is used to reveal which of the following vulnerabili...
Question 12: Which of the following is the BEST example of a reputation i...
Question 13: If a current private key is compromised, which of the follow...
Question 14: In which of the following situations would it be BEST to use...
Question 15: A critical web application experiences slow response times d...
Question 16: An organization has hired a new remote workforce. Many new e...
Question 17: A userreceived an SMS on a mobile phone that asked for bank ...
Question 18: A company wants to configure its wireless network to require...
Question 19: A corporation wants to allow users who work for its affiliat...
Question 20: Company engineers regularly participate in a public Internet...
Question 21: A coffee company has hired an IT consultant to set up a WiFi...
Question 22: A Chief Information Security Officer (CISO) asks the securit...
Question 23: Confidential corporate data was recently stolen by an attack...
Question 24: A security engineer wants to further secure a sensitive VLAN...
Question 25: An email systems administrator is configuring the mail serve...
Question 26: The web platform team is deploying a new web application Dur...
Question 27: A transitive trust:
Question 28: Which of the following models is considered an iterative app...
Question 29: Which of the following attacks is used to capture the WPA2 h...
Question 30: A network engineer needs to allow an organization's users to...
Question 31: A security administrator is Implementing a secure method tha...
Question 32: An organization has hired a security analyst to perform a pe...
Question 33: Which of the following is a passive method to test whether t...
Question 34: A technician is evaluating a security appliance solution. Th...
Question 35: Which of the following are the BEST selection criteria to us...
Question 36: A network technician is setting up a new branch for a compan...
Question 37: A company help desk as received several reports that employe...
Question 38: The network information for a workstation is as follows: (Ex...
Question 39: A systems engineer wants to leverage a cloud-based architect...
Question 40: Joe, an employee, asks a coworker how long ago Ann started w...
Question 41: A university with remote campuses, which all use different s...
Question 42: Two companies are enabling TLS on their respective email gat...
Question 43: An attack has occurred against a company. INSTRUCTIONS You h...
Question 44: Given the following output: Which of the following BEST desc...
Question 45: A computer forensics analyst collected a flash drive that co...
Question 46: A restaurant wants to deploy tablets to all waitstaff but do...
Question 47: A company wants to ensure confidential data from storage med...
Question 48: A company just implemented a new telework policy that allows...
Question 49: Which of the following is a component of multifactor authent...
Question 50: A company is having Issues with intellectual property being ...
Question 51: The Chief Information Officer (CIO) has heard concerns from ...
Question 52: A user loses a COPE device. Which of the following should th...
Question 53: An internal intranet site is required to authenticate users ...
Question 54: A systems administrator needs to integrate multiple loT and ...
Question 55: After a ransomware attack. a forensics company needs to revi...
Question 56: A systems administrator is implementing a remote access meth...
Question 57: A security analyst is specifying requirements for a wireless...
Question 58: Task: Configure the firewall (fill out the table) to allow t...
Question 59: A network administrator was recently terminated. A few weeks...
Question 60: The CSIRT is reviewing the lessons learned from a recent inc...
Question 61: A company recently contracted a penetration testing firm to ...
Question 62: Which of the following algorithms would be used to provide n...
Question 63: Which of the following are considered to be "something you d...
Question 64: A coffee company which operates a chain of stores across a l...
Question 65: Which of the following implements two-factor authentication ...
Question 66: Penetration testing is distinct from vulnerability scanning ...
Question 67: An Organization requires secure configuration baselines for ...
Question 68: While monitoring the SIEM, a security analyst observes traff...
Question 69: The application team within a company is asking the security...
Question 70: A security analyst is assessing a small company's internal s...
Question 71: After entering a username and password, an administrator mus...
Question 72: A company needs to fix some audit findings related to its ph...
Question 73: A retail executive recently accepted a job with a major comp...
Question 74: A technician has been asked to document which services are r...
Question 75: A company has had a BYOD policy in place for many years and ...
Question 76: In which of the following risk management strategies would c...
Question 77: An application developer is working on a new calendar and sc...
Question 78: During a forensic investigation, which of the following must...
Question 79: While testing a new vulnerability scanner, a technician beco...
Question 80: Which of the following attacks can be mitigated by proper da...
Question 81: A newly hired Chief Security Officer (CSO) is reviewing the ...
Question 82: An organization is concerned that Its hosted web servers are...
Question 83: A security analyst recommends implementing SSL for an existi...
Question 84: A security engineer is setting up passwordless authenticatio...
Question 85: A technician is required to configure updates on a guest ope...
Question 86: A security analyst is investigating a security breach involv...
Question 87: A company is deploying a wireless network. It is a requireme...
Question 88: A company has purchased a new SaaS application and is in the...
Question 89: A systems administrator needs to configure an SSL remote acc...
Question 90: An attacker is able to capture the payload for the following...
Question 91: After a systems administrator installed and configured Kerbe...
Question 92: An organization requires two separate factors as part of an ...
Question 93: A company uses WPA2-PSK. and it appears there are multiple u...
Question 94: A company utilizes 802.11 for all client connectivity within...
Question 95: Which of the following is MOST likely caused by improper inp...
Question 96: Which of the following involves the use of targeted and high...
Question 97: Which of the following would have the GREATEST impact on the...
Question 98: An attacker has recently compromised an executives laptop an...
Question 99: A security analyst needs a solution that can execute potenti...
Question 100: A security operations team recently detected a breach of cre...
Question 101: A systems administrator wants to replace the process of usin...
Question 102: An organization wants to set up a wireless network in the mo...
Question 103: After running an online password cracking tool, an attacker ...
Question 104: A user wants to send a confidential message to a customer to...
Question 105: Using a one-time code that has been texted to a smartphone i...
Question 106: An organization prefers to apply account permissions to grou...
Question 107: An organization uses an antivirus scanner from Company A on ...
Question 108: In the event of a security incident, which of the following ...
Question 109: A company network is currently under attack. Although securi...
Question 110: During an audit, the auditor requests to see a copy of the i...
Question 111: A security engineer wants to add SSL to the public web serve...
Question 112: SIMULATION A security administrator discovers that an attack...
Question 113: SIMULATION Select the appropriate attack and remediation fro...
Question 114: A government contracting company Issues smartphones lo emplo...
Question 115: A systems administrator has created network file shares for ...
Question 116: A system uses an application server and database server Empl...
Question 117: A technician is implementing 802 1X with dynamic VLAN assign...
Question 118: A cybersecurity analyst needs to Implement secure authentica...
Question 119: A company is looking for an all-in-one solution to provide i...
Question 120: A technician is designing a solution that will be required t...
Question 121: A security administrator in a bank is required to enforce an...
Question 122: A developer is creating a new web application on a public cl...
Question 123: A network administrator needs 10 prevent users from accessin...
Question 124: An analyst is concerned about data leaks and wants to restri...
Question 125: To reduce costs and overhead, an organization wants to move ...
Question 126: If two employees are encrypting traffic between them using a...
Question 127: An administrator is setting up automated remote file transfe...
Question 128: An incident response analyst in a corporate security operati...
Question 129: A preventive control differs from a compensating control in ...
Question 130: An engineer is configuring a wireless network using PEAP for...
Question 131: Which of the following impacts MOST likely results from poor...
Question 132: A Chief Information Security Officer (CISO) is performing a ...
Question 133: A security administrator plans to conduct a vulnerability sc...
Question 134: An analyst is currently looking at the following output: (Ex...
Question 135: During an incident, a company's CIRT determines it is necess...
Question 136: For each of the given items, select the appropriate authenti...
Question 137: A large Industrial system's smart generator monitors the sys...
Question 138: A Chief Information Security Officer (CISO) for a school dis...
Question 139: A new PKI is being bum at a company, but the network adminis...
Question 140: A company is planning to utilize its legacy desktop systems ...
Question 141: The help desk received a call from a user who was trying to ...
Question 142: A security administrator is creating a risk assessment on BY...
Question 143: During a network assessment a security analyst identifies th...
Question 144: A network administrator has been asked to install an IDS to ...
Question 145: Which of the following BEST explains why a development envir...
Question 146: An organization requires three separate factors for authenti...
Question 147: A security team has downloaded a public database of the larg...
Question 148: Staff members of an organization received an email message f...
Question 149: A security administrator is implementing a SIEM and needs to...
Question 150: An organization wishes to allow its users to select devices ...
Question 151: Which of the following may indicate a configuration item has...
Question 152: After discovering a buffer overflow vulnerability an applica...
Question 153: An organization has decided to host its web application and ...
Question 154: Moving laterally within a network once an initial exploit is...
Question 155: Which of the following serves to warn users against download...
Question 156: Which of the following BEST explains the reason why a server...
Question 157: An Organization requires secure configuration baselines for ...
Question 158: Which of the following BEST explains why sandboxing is a bes...
Question 159: A security analyst has recently deployed an MDM solution tha...
Question 160: Which of the following Is a resiliency strategy that allows ...
Question 161: A member of the IR team has identified an infected computer ...
Question 162: Which of the following BEST describes why an air gap is a us...
Question 163: A security analyst runs a monthly file integrity check on th...
Question 164: A systems administrator recently issued a public/private key...
Question 165: A government agency with sensitive information wants to virt...
Question 166: A critical enterprise component whose loss or destruction wo...
Question 167: An organization has decided to purchase an insurance policy ...
Question 168: An authorized user is conducting a penetration scan of a sys...
Question 169: A company's IT staff is given the task of securely disposing...
Question 170: A security administrator found the following piece of code r...
Question 171: Which of the following BEST explains how the use of configur...
Question 172: Which of the following is unique to a stream cipher?...
Question 173: During certain vulnerability scanning scenarios, It is possi...
Question 174: A security engineer is analyzing the following line of JavaS...
Question 175: A technician wants to add wireless guest capabilities to an ...
Question 176: A security administrator has created a new group policy obje...
Question 177: Which of the following BEST explains the difference between ...
Question 178: Which of the following types of security testing is the MOST...
Question 179: Using an ROT13 cipher to protocol confidential information f...
Question 180: A buffer overflow can result in:...
Question 181: An employee opens a web browser and types a URL into the add...
Question 182: Leveraging the information supplied below, complete the CSR ...
Question 183: You have been tasked with designing a security plan for your...
Question 184: Which of the following implements a stream cipher?...
Question 185: When an initialization vector is added to each encryption cy...
Question 186: A security analyst is interested in setting up an IDS to mon...
Question 187: A government organization recently contacted three different...
Question 188: A company wants to deploy PKI on its Internet-facing website...
Question 189: An attacker has gathered information about a company employe...
Question 190: A security administrator suspects there may be unnecessary s...
Question 191: The security office has had reports of increased tailgating ...
Question 192: A security analyst is using a recently released security adv...
Question 193: An attacker has gained control of several systems on the Int...
Question 194: Several systems and network administrators are determining h...
Question 195: Which of the following agreement types is a non-contractual ...
Question 196: A systems administrator is receiving multiple alerts from th...
Question 197: An Organization wants to separate permissions for individual...
Question 198: Which of the following is MOST likely the security impact of...
Question 199: Ann. a user, reports she is receiving emails that appear to ...
Question 200: Users are attempting to access a company's website but are t...
Question 201: A company that processes sensitive information has implement...
Question 202: Which of the following would MOST likely support the integri...
Question 203: Which of the following has the potential to create a DoS att...
Question 204: A security administrator is investigating a possible account...
Question 205: An analyst generates the following color-coded table shown i...
Question 206: A malicious actor compromises a legitimate website, configur...
Question 207: A security analyst is asked to check the configuration of th...