<< Prev Question Next Question >>

Question 156/199

A network engineer needs to build a solution that will allow guests at the company's headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet. Which of the following should the engineer employ to meet these requirements?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (199q)
Question 1: A Chief Information Security Officer (CISO) needs to create ...
Question 2: A small business office is setting up a wireless infrastruct...
Question 3: A security analyst receives the configuration of a current V...
Question 4: Which of the following is an example of federated access man...
Question 5: Which of the following BEST describes the MFA attribute that...
Question 6: Employees are having issues accessing the company's website....
Question 7: A customer called a company's security team to report that a...
Question 8: Which of the following should be put in place when negotiati...
Question 9: A large industrial system's smart generator monitors the sys...
Question 10: A security analyst needs to determine how an attacker was ab...
Question 11: A security operations analyst is using the company's SIEM so...
Question 12: Which of the following would a European company interested i...
Question 13: A company is upgrading its wireless infrastructure to WPA2-E...
Question 14: An enterprise needs to keep cryptographic keys in a safe man...
Question 15: The Chief Financial Officer (CFO) of an insurance company re...
Question 16: A security analyst is investigating a vulnerability in which...
Question 17: A company is launching a new internet platform for its clien...
Question 18: Which of the following job roles would sponsor data quality ...
Question 19: Which of the following refers to applications and systems th...
Question 20: A security engineer has enabled two-factor authentication on...
Question 21: A new security engineer has started hardening systems. One o...
Question 22: A security engineer needs to Implement the following require...
Question 23: The security team received a report of copyright infringemen...
Question 24: A company wants to modify its current backup strategy to min...
Question 25: A security analyst has received several reports of an issue ...
Question 26: Which of the following allows for functional test data to be...
Question 27: Local guidelines require that all information systems meet a...
Question 28: A systems administrator wants to disable the use of username...
Question 29: An engineer is setting up a VDI environment for a factory lo...
Question 30: A grocery store is expressing security and reliability conce...
Question 31: A cybersecurity administrator has a reduced team and needs t...
Question 32: Which of the following BEST explains the difference between ...
Question 33: A security analyst needs to perf rm periodic vulnerability s...
Question 34: A company has three technicians who share the same credentia...
Question 35: Which of the following cloud models provides clients with se...
Question 36: A security analyst receives a SIEM alert that someone logged...
Question 37: An enterprise has hired an outside security firm to conduct ...
Question 38: An organization is having difficulty correlating events from...
Question 39: A systems administrator needs to install a new wireless netw...
Question 40: Which of the following often operates in a client-server arc...
Question 41: Which of the following controls would BEST identify and repo...
Question 42: When planning to build a virtual environment, an administrat...
Question 43: Which of the following is a valid multifactor authentication...
Question 44: A company was compromised, and a security analyst discovered...
Question 45: Which two features are available only in next-generation fir...
Question 46: An incident response technician collected a mobile device du...
Question 47: A security analyst is logged into a Windows file server and ...
Question 48: A system administrator needs to implement an access control ...
Question 49: To reduce costs and overhead, an organization wants to move ...
Question 50: A user recently entered a username and password into a recru...
Question 51: An analyst needs to set up a method for securely transferrin...
Question 52: An organization is concerned about hackers potentially enter...
Question 53: After segmenting the network, the network manager wants to c...
Question 54: A retail company that is launching a new website to showcase...
Question 55: A university with remote campuses, which all use different s...
Question 56: The Chief Security Officer (CSO) at a major hospital wants t...
Question 57: A security administrator is trying to determine whether a se...
Question 58: Entering a secure area requires passing through two doors, b...
Question 59: Security analyst must enforce policies to harden an MOM infr...
Question 60: A security auditor is reviewing vulnerability scan data prov...
Question 61: A network administrator has been alerted that web pages are ...
Question 62: Which of the following would cause a Chief Information Secur...
Question 63: A system in the network is used to store proprietary secrets...
Question 64: Users reported several suspicious activities within the last...
Question 65: An organization has a growing workforce that is mostly drive...
Question 66: An attack relies on an end user visiting a website the end u...
Question 67: An organization with a low tolerance for user inconvenience ...
Question 68: An organization that is located in a flood zone is MOST like...
Question 69: Which of the following would satisfy three-factor authentica...
Question 70: Which of the following will MOST likely adversely impact the...
Question 71: A technician needs to prevent data loss in a laboratory. The...
Question 72: A company's help desk received several AV alerts indicating ...
Question 73: During an incident, a company's CIRT determines it is necess...
Question 74: A client sent several inquiries to a project manager about t...
Question 75: A company has determined that if its computer-based manufact...
Question 76: An organization recently recovered from a data breach. Durin...
Question 77: A healthcare company is revamping its IT strategy in light o...
Question 78: Which of the following is the correct order of volatility fr...
Question 79: A security analyst is configuring a large number of new comp...
Question 80: Which of the following ISO standards is certified for privac...
Question 81: An attacker was easily able to log in to a company's securit...
Question 82: The SIEM at an organization has detected suspicious traffic ...
Question 83: A company was recently breached Part of the company's new cy...
Question 84: A company's cybersecurity department is looking for a new so...
Question 85: A security analyst is investigating a call from a user regar...
Question 86: A company has drafted an insider-threat policy that prohibit...
Question 87: An organization is developing an authentication service for ...
Question 88: Which of the following is the BEST use of a WAF?...
Question 89: A security analyst has been asked to investigate a situation...
Question 90: A company is implementing MFA for all applications that stor...
Question 91: An organization relies on third-party video conferencing to ...
Question 92: The SOC is reviewing process and procedures after a recent i...
Question 93: A root cause analysis reveals that a web application outage ...
Question 94: A company recently experienced a data breach and the source ...
Question 95: An organization has hired a security analyst to perform a pe...
Question 96: After entering a username and password, and administrator mu...
Question 97: A security modern may have occurred on the desktop PC of an ...
Question 98: The facilities supervisor for a government agency is concern...
Question 99: A database administrator needs to ensure all passwords are s...
Question 100: Which of the following encryption algorithms require one enc...
Question 101: A security analyst must determine if either SSH or Telnet is...
Question 102: A security engineer is reviewing log files after a third dis...
Question 103: A security analyst is reviewing the following attack log out...
Question 104: Which of the following environments would MOST likely be use...
Question 105: A security assessment found that several embedded systems ar...
Question 106: An attacker is trying to gain access by installing malware o...
Question 107: A cybersecurity administrator needs to add disk redundancy f...
Question 108: In which of the following common use cases would steganograp...
Question 109: A user recent an SMS on a mobile phone that asked for bank d...
1 commentQuestion 110: Which of the following algorithms has the SMALLEST key size?...
Question 111: An organization regularly scans its infrastructure for missi...
Question 112: An organization's corporate offices were destroyed due to a ...
Question 113: A security analyst is running a vulnerability scan to check ...
Question 114: A security analyst has received an alert about being sent vi...
Question 115: Joe. a security analyst, recently performed a network discov...
Question 116: When implementing automation with loT devices, which of the ...
Question 117: The exploitation of a buffer-overrun vulnerability in an app...
Question 118: An analyst is generating a security report for the managemen...
Question 119: An information security officer at a credit card transaction...
Question 120: A security administrator has noticed unusual activity occurr...
Question 121: A user must introduce a password and a USB key to authentica...
Question 122: A desktop support technician recently installed a new docume...
Question 123: The following are the logs of a successful attack. (Exhibit)...
Question 124: A company provides mobile devices to its users to permit acc...
Question 125: A remote user recently took a two-week vacation abroad and b...
Question 126: A security analyst is reviewing a penetration-testing report...
Question 127: A security analyst is reviewing the following output from a ...
Question 128: After consulting with the Chief Risk Officer (CRO). A manage...
Question 129: Which of the following types of controls is a CCTV camera th...
Question 130: Which of the following scenarios would make a DNS sinkhole e...
Question 131: An organization's RPO for a critical system is two hours. Th...
Question 132: A company moved into a new building next to a sugar mill. Cr...
Question 133: A company has been experiencing very brief power outages fro...
Question 134: Remote workers in an organization use company-provided lapto...
Question 135: To mitigate the impact of a single VM being compromised by a...
Question 136: A security analyst is investigating a phishing email that co...
Question 137: A company recently set up an e-commerce portal to sell its p...
Question 138: A network administrator has been asked to install an IDS to ...
Question 139: An organization wants to implement a third factor to an exis...
Question 140: The president of a company that specializes in military cont...
Question 141: A security analyst was deploying a new website and found a c...
Question 142: An organization needs to implement more stringent controls o...
Question 143: Which of the following environments minimizes end-user disru...
Question 144: The Chief Executive Officer (CEO) of an organization would l...
Question 145: A nuclear plant was the victim of a recent attack, and all t...
Question 146: A security analyst notices several attacks are being blocked...
Question 147: A network engineer needs to create a plan for upgrading the ...
Question 148: A researcher has been analyzing large data sets for the last...
Question 149: Which of the following function as preventive, detective, an...
Question 150: During a security assessment, a security finds a file with o...
Question 151: Some laptops recently went missing from a locked storage are...
Question 152: A company just implemented a new telework policy that allows...
Question 153: A malicious actor recently penetration a company's network a...
Question 154: A security analyst discovers that a company username and pas...
Question 155: A security administrator checks the table of a network switc...
Question 156: A network engineer needs to build a solution that will allow...
1 commentQuestion 157: A company is required to continue using legacy software to s...
Question 158: Which of the following control sets should a well-written BC...
Question 159: A security researcher is attempting to gather data on the wi...
Question 160: The manager who is responsible for a data set has asked a se...
Question 161: An attacker has successfully exfiltrated several non-salted ...
Question 162: Joe, a user at a company, clicked an email link led to a web...
Question 163: Joe, an employee, receives an email stating he won the lotte...
Question 164: Which of the following organizational policies are MOST like...
Question 165: A security researcher has alerted an organization that its s...
Question 166: A recently discovered zero-day exploit utilizes an unknown v...
Question 167: When used at the design stage, which of the following improv...
Question 168: During an asset inventory, several assets, supplies, and mis...
Question 169: A security analyst needs to find real-time data on the lates...
Question 170: Which of the following would be BEST to establish between or...
Question 171: A company is experiencing an increasing number of systems th...
Question 172: A security assessment determines DES and 3DES at still being...
Question 173: A security administrator currently spends a large amount of ...
Question 174: A university is opening a facility in a location where there...
Question 175: A local coffee shop runs a small WiFi hotspot for its custom...
Question 176: Which of the following scenarios BEST describes a risk reduc...
Question 177: Which of the following should a technician use to protect a ...
Question 178: A company processes highly sensitive data and senior managem...
Question 179: A company is implementing a DLP solution on the file server....
Question 180: A company uses wireless tor all laptops and keeps a very det...
Question 181: A security analyst needs to complete an assessment. The anal...
Question 182: After a ransomware attack a forensics company needs to revie...
Question 183: A security engineer needs to implement an MDM solution that ...
Question 184: A startup company is using multiple SaaS and IaaS platforms ...
Question 185: A network administrator at a large organization Is reviewing...
Question 186: An organization is building backup sever moms in geographica...
Question 187: An organization has been experiencing outages during holiday...
Question 188: A manufacturing company has several one-off legacy informati...
Question 189: A preventive control differs from a compensating control in ...
Question 190: A company is setting up a web server on the Internet that wi...
1 commentQuestion 191: A Chief Information Officer receives an email stating a data...
Question 192: A systems administrator is looking for a solution that will ...
Question 193: An organization's Chief Security Officer (CSO) wants to vali...
Question 194: A security analyst is investigating multiple hosts that are ...
Question 195: A security analyst needs to implement an MDM solution for BY...
Question 196: A security analyst is investigating an incident to determine...
Question 197: An organization has implemented a two-step verification proc...
Question 198: An organization discovers that unauthorized applications hav...
Question 199: An organization hired a consultant to assist with an active ...