<< Prev Question Next Question >>

Question 36/164

A small business office is setting up a wireless infrastructure with primary requirements centered around protecting customer information and preventing unauthorized access to the business network. Which of the following would BEST support the office's business needs? (Select TWO)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (164q)
Question 1: An analyst is trying to identify insecure services that are ...
Question 2: A cybersecurity administrator has a reduced team and needs t...
Question 3: A Chief Information Officer receives an email stating a data...
Question 4: An organization is concerned that is hosted web servers are ...
Question 5: A financial institution would like to stare is customer data...
Question 6: A security assessment determines DES and 3DES at still being...
Question 7: The website http://companywebsite.com requires users to prov...
1 commentQuestion 8: The security administrator has installed a new firewall whic...
Question 9: A security analyst must determine if either SSH or Telnet is...
Question 10: A company is setting up a web server on the Internet that wi...
Question 11: A security administrator needs to inspect in-transit files o...
Question 12: A smart switch has the ability to monitor electrical levels ...
Question 13: While reviewing pcap data, a network security analyst is abl...
Question 14: A malicious actor recently penetration a company's network a...
Question 15: Company engineers regularly participate in a public Internet...
Question 16: A privileged user at a company stole several proprietary doc...
Question 17: Accompany deployed a WiFi access point in a public area and ...
Question 18: A cybersecurity administrator is using iptables as an enterp...
Question 19: A company just implemented a new telework policy that allows...
Question 20: A security analyst needs to perform periodic vulnerably scan...
Question 21: Which of the following are requirements that must be configu...
Question 22: The security team received a report of copyright infringemen...
Question 23: The IT department at a university is concerned about profess...
Question 24: A Chief Security Officer (CSO) was notified that a customer ...
Question 25: A company is upgrading its wireless infrastructure to WPA2-E...
Question 26: A cybersecurity manager has scheduled biannual meetings with...
Question 27: Select the appropriate attack and remediation from each drop...
Question 28: A Chief Security Officer (CSO) is concerned about the amount...
Question 29: A user downloaded an extension for a browser, and the uses d...
Question 30: A security administrator is analyzing the corporate wireless...
Question 31: A symmetric encryption algorithm Is BEST suited for:...
Question 32: Which of the following should a technician consider when sel...
Question 33: Which of the following would be BEST to establish between or...
Question 34: A security manager for a retailer needs to reduce the scope ...
Question 35: A security analyst is reviewing the output of a web server l...
Question 36: A small business office is setting up a wireless infrastruct...
Question 37: The new Chief Executive Officer (CEO) of a large company has...
Question 38: A website developer is working on a new e-commerce website a...
Question 39: A company recently experienced a data breach and the source ...
Question 40: A company is implementing a new SIEM to log and send alerts ...
Question 41: To further secure a company's email system, an administrator...
Question 42: A Chief Security Officer (CSO) is concerned about the volume...
Question 43: A major political party experienced a server breach. The hac...
Question 44: A network administrator has been asked to design a solution ...
Question 45: A client sent several inquiries to a project manager about t...
Question 46: A user recently attended an exposition and received some dig...
Question 47: Which of the following will MOST likely cause machine learni...
Question 48: A financial analyst has been accused of violating the compan...
Question 49: An organization has expanded its operations by opening a rem...
Question 50: The spread of misinformation surrounding the outbreak of a n...
Question 51: An auditor is performing an assessment of a security applian...
Question 52: A customer called a company's security team to report that a...
Question 53: A network manager is concerned that business may be negative...
Question 54: A security analyst is investigation an incident that was fir...
Question 55: An analyst visits an internet forum looking for information ...
Question 56: A network technician is installing a guest wireless network ...
Question 57: Which of the following is MOST likely to outline the roles a...
Question 58: A security analyst needs to produce a document that details ...
Question 59: If a current private key is compromised, which of the follow...
Question 60: A cloud administrator is configuring five compute instances ...
Question 61: A remote user recently took a two-week vacation abroad and b...
Question 62: Joe. a security analyst, recently performed a network discov...
Question 63: Which of the following distributes data among nodes, making ...
Question 64: An information security officer at a credit card transaction...
Question 65: A network administrator would like to configure a site-to-si...
Question 66: A network administrator is concerned about users being expos...
Question 67: A company recently moved sensitive videos between on-premise...
Question 68: A pharmaceutical sales representative logs on to a laptop an...
Question 69: A company was recently breached Part of the company's new cy...
Question 70: A Chief Executive Officer's (CEO) personal information was s...
Question 71: A small business just recovered from a ransomware attack aga...
Question 72: An.. that has a large number of mobile devices is exploring ...
Question 73: Which of the following types of attacks is specific to the i...
Question 74: When selecting a technical solution for identity management,...
Question 75: A smart retail business has a local store and a newly establ...
Question 76: A security analyst is configuring a large number of new comp...
Question 77: A company's help desk received several AV alerts indicating ...
Question 78: A development team employs a practice of bringing all the co...
Question 79: Which of the following incident response steps involves acti...
Question 80: When implementing automation with loT devices, which of the ...
Question 81: A newly purchased corporate WAP needs to be configured in th...
Question 82: A security analyst receives a SIEM alert that someone logged...
Question 83: A company processes highly sensitive data and senior managem...
Question 84: A company has drafted an insider-threat policy that prohibit...
Question 85: Which of the following would a European company interested i...
Question 86: A document that appears to be malicious has been discovered ...
Question 87: A nuclear plant was the victim of a recent attack, and all t...
Question 88: The SIEM at an organization has detected suspicious traffic ...
Question 89: A company wants to modify its current backup strategy to min...
Question 90: A security analyst was deploying a new website and found a c...
Question 91: A systems administrator needs to install a new wireless netw...
Question 92: Which of the following would BEST identify and remediate a d...
Question 93: A security administrator needs to create a RAIS configuratio...
Question 94: A technician needs to prevent data loss in a laboratory. The...
Question 95: A company has been experiencing very brief power outages fro...
Question 96: The concept of connecting a user account across the systems ...
Question 97: Which of the following would be the BEST resource lor a soft...
Question 98: A security analyst reviews the datacenter access logs for a ...
Question 99: Which of the following is a team of people dedicated testing...
Question 100: A company has limited storage available and online presence ...
Question 101: After entering a username and password, and administrator mu...
Question 102: A Chief Information Security Officer (CISO) is concerned abo...
Question 103: Several employees return to work the day after attending an ...
Question 104: A security assessment found that several embedded systems ar...
Question 105: Which of the following terms should be included in a contrac...
Question 106: A company's Chief Information Security Officer (CISO) recent...
Question 107: During an incident response, a security analyst observes the...
Question 108: Which of the following would be the BEST method for creating...
Question 109: Which of the following will provide the BEST physical securi...
Question 110: A network administrator at a large organization Is reviewing...
Question 111: Joe, a user at a company, clicked an email link led to a web...
Question 112: Ann, a forensic analyst, needs to prove that the data she or...
Question 113: An attacker was easily able to log in to a company's securit...
Question 114: A Chief Security Office's (CSO's) key priorities are to impr...
Question 115: An attack relies on an end user visiting a website the end u...
Question 116: A consultant is configuring a vulnerability scanner for a la...
Question 117: A developer is building a new portal to deliver single-pane-...
Question 118: Which of the following job roles would sponsor data quality ...
Question 119: The process of passively gathering information prior to laun...
Question 120: Which of the following is a risk that is specifically associ...
Question 121: Remote workers in an organization use company-provided lapto...
Question 122: An organization has hired a security analyst to perform a pe...
Question 123: An organization is developing an authentication service for ...
Question 124: A company provides mobile devices to its users to permit acc...
Question 125: A recent security assessment revealed that an actor exploite...
Question 126: An organization has a growing workforce that is mostly drive...
Question 127: Which of the following provides the BEST protection for sens...
Question 128: A security modern may have occurred on the desktop PC of an ...
Question 129: A company uses specially configured workstations tor any wor...
Question 130: A security auditor is reviewing vulnerability scan data prov...
Question 131: A financial organization has adopted a new secure, encrypted...
Question 132: The Chief Financial Officer (CFO) of an insurance company re...
Question 133: A security administrator currently spends a large amount of ...
Question 134: Which of the following would cause a Chief Information Secur...
Question 135: An organization's finance department is implementing a polic...
Question 136: A network engineer notices the VPN concentrator overloaded a...
Question 137: A systems administrator needs to install the same X.509 cert...
Question 138: A security administrator suspects there may be unnecessary s...
Question 139: A security engineer needs to enhance MFA access to sensitive...
Question 140: A public relations team will be taking a group of guest on a...
Question 141: A security analyst wants to verify that a client-server (non...
Question 142: A university is opening a facility in a location where there...
Question 143: To secure an application after a large data breach, an e-com...
Question 144: An organization's RPO for a critical system is two hours. Th...
Question 145: A local coffee shop runs a small WiFi hot-spot for its custo...
Question 146: Which of the following allows for functional test data to be...
Question 147: A SECURITY ANALYST NEEDS TO FIND REAL-TIME DATA ON THE LATES...
Question 148: Which of the following controls would BEST identify and repo...
Question 149: While investigating a data leakage incident, a security anal...
Question 150: A company uses wireless tor all laptops and keeps a very det...
Question 151: A user must introduce a password and a USB key to authentica...
Question 152: An organization's corporate offices were destroyed due to a ...
Question 153: Which of the following technical controls is BEST suited for...
Question 154: After a ransomware attack a forensics company needs to revie...
Question 155: During a security assessment, a security finds a file with o...
Question 156: The Chief Information Security Officer wants to pilot a new ...
Question 157: Which of the following often operates in a client-server arc...
Question 158: Which of the following environments minimizes end-user disru...
Question 159: Which of the following job roles would sponsor data quality ...
Question 160: A cybersecurity administrator needs to add disk redundancy f...
Question 161: Which of the following types of controls is a CCTV camera th...
Question 162: A root cause analysis reveals that a web application outage ...
Question 163: A security analyst is reviewing information regarding recent...
Question 164: In which of the following risk management strategies would c...