<< Prev Question Next Question >>

Question 37/94

A security engineer is setting up passwordless authentication for the first time.
INSTRUCTIONS
Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (94q)
Question 1: In the middle of a cybersecurity, a security engineer remove...
Question 2: A company uses wireless tor all laptops and keeps a very det...
Question 3: A network administrator is setting up wireless access points...
Question 4: A public relations team will be taking a group of guest on a...
Question 5: A manufacturer creates designs for very high security produc...
Question 6: A workwide manufacturing company has been experiencing email...
Question 7: A security analyst is reviewing logs on a server and observe...
Question 8: Which of the following is MOST likely to contain ranked and ...
Question 9: A technician needs to prevent data loss in a laboratory. The...
Question 10: A network administrator would like to configure a site-to-si...
Question 11: A Chief Information Security Officer (CISO) is concerned abo...
Question 12: A network administrator has been alerted that web pages are ...
Question 13: In which of the following common use cases would steganograp...
Question 14: An organization just experienced a major cyberattack modem. ...
Question 15: Which of the following job roles would sponsor data quality ...
Question 16: The IT department's on-site developer has been with the team...
Question 17: Which of the following would BEST identify and remediate a d...
Question 18: On which of the following is the live acquisition of data fo...
Question 19: Which of the following should be put in place when negotiati...
Question 20: The Chief Executive Officer (CEO) of an organization would l...
Question 21: A university with remote campuses, which all use different s...
Question 22: Which of the following allows for functional test data to be...
Question 23: A security administrator suspects there may be unnecessary s...
Question 24: A company recently transitioned to a strictly BYOD culture d...
Question 25: A security analyst is performing a packet capture on a serie...
Question 26: An analyst visits an internet forum looking for information ...
Question 27: A recent malware outbreak across a subnet included successfu...
Question 28: An organization's Chief Security Officer (CSO) wants to vali...
Question 29: An organization needs to implement more stringent controls o...
Question 30: A security audit has revealed that a process control termina...
Question 31: In which of the following risk management strategies would c...
Question 32: Which of the following types of controls is a turnstile?...
Question 33: A security analyst is reviewing the following attack log out...
Question 34: A small business just recovered from a ransomware attack aga...
Question 35: A company's Chief Information Office (CIO) is meeting with t...
Question 36: An organization has hired a security analyst to perform a pe...
Question 37: A security engineer is setting up passwordless authenticatio...
Question 38: A security modern may have occurred on the desktop PC of an ...
Question 39: A security auditor is reviewing vulnerability scan data prov...
Question 40: An organization that is located in a flood zone is MOST like...
Question 41: A cybersecurity department purchased o new PAM solution. The...
Question 42: A network administrator has been asked to install an IDS to ...
Question 43: A user is concerned that a web application will not be able ...
Question 44: A client sent several inquiries to a project manager about t...
Question 45: A security analyst is configuring a large number of new comp...
Question 46: A company is upgrading its wireless infrastructure to WPA2-E...
Question 47: A forensics examiner is attempting to dump password cached i...
Question 48: A small company that does not have security staff wants to i...
Question 49: Which of the following are the MOST likely vectors for the u...
Question 50: A pharmaceutical sales representative logs on to a laptop an...
Question 51: A company was recently breached Part of the company's new cy...
Question 52: To reduce costs and overhead, an organization wants to move ...
Question 53: Joe, a user at a company, clicked an email link led to a web...
Question 54: Which of the following technical controls is BEST suited for...
Question 55: Which of the following relets to applications and systems th...
Question 56: Which of the following will provide the BEST physical securi...
Question 57: A security analyst is reviewing a new website that will soon...
Question 58: An organization blocks user access to command-line interpret...
Question 59: An analyst has determined that a server was not patched and ...
Question 60: An organization is developing an authentication service for ...
Question 61: A commercial cyber-threat intelligence organization observes...
Question 62: A user recently entered a username and password into a recru...
Question 63: A user enters a password to log in to a workstation and is t...
Question 64: A security analyst has received an alert about being sent vi...
Question 65: A security analyst needs to produce a document that details ...
Question 66: A startup company is using multiple SaaS and IaaS platforms ...
Question 67: Which of the following BEST explains the difference between ...
Question 68: A security analyst is logged into a Windows file server and ...
Question 69: A network administrator has been asked to design a solution ...
Question 70: During a routine scan of a wireless segment at a retail comp...
Question 71: A document that appears to be malicious has been discovered ...
Question 72: A company recently set up an e-commerce portal to sell its p...
Question 73: Which of the following cloud models provides clients with se...
Question 74: An incident response technician collected a mobile device du...
Question 75: A security analyst is reviewing the output of a web server l...
Question 76: Which of the following provides the BEST protection for sens...
Question 77: Users at organization have been installing programs from the...
Question 78: Which of the following types of controls is a CCTV camera th...
Question 79: Which of the following BEST explains the reason why a server...
Question 80: A company has limited storage available and online presence ...
Question 81: A nuclear plant was the victim of a recent attack, and all t...
Question 82: A company processes highly sensitive data and senior managem...
Question 83: The manager who is responsible for a data set has asked a se...
Question 84: A security analyst is reviewing information regarding recent...
Question 85: Given the following logs: (Exhibit) Which of the following B...
Question 86: A company is designing the layout of a new datacenter so it ...
Question 87: A system administrator needs to implement an access control ...
Question 88: A security analyst reviews the datacenter access logs for a ...
Question 89: Which of the following scenarios BEST describes a risk reduc...
Question 90: A cybersecurity administrator is using iptables as an enterp...
Question 91: The following is an administrative control that would be MOS...
Question 92: A cybersecurity analyst needs to implement secure authentica...
Question 93: An organization is developing a plan in the event of a compl...
Question 94: A large enterprise has moved all Hs data to the cloud behind...