<< Prev Question Next Question >>

Question 30/146

HexCom, a leading IT Company in the USA, realized that their employees were having trouble accessing multiple servers with different passwords. Due to this, the centralized server was also being overburdened by avoidable network traffic. To overcome the issue, what type of authentication can be given to the employees?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (146q)
Question 1: Who is responsible for executing the policies and plans requ...
Question 2: Identify the network topology where each computer acts as a ...
Question 3: Which wireless networking topology setup requires same chann...
Question 4: David is working in a mid-sized IT company. Management asks ...
Question 5: Which among the following filter is used to detect a SYN/FIN...
Question 6: Which of the following Wireshark filters allows an administr...
Question 7: You are tasked to perform black hat vulnerability assessment...
Question 8: What cryptography technique can encrypt small amounts of dat...
Question 9: The IR team and the network administrator have successfully ...
Question 10: Which of the following examines Recovery Point Objectives (R...
Question 11: Which RAID level does not provide data redundancy?...
Question 12: In Public Key Infrastructure (PKI), which authority is respo...
Question 13: Lyle is the IT director for a medium-sized food service supp...
Question 14: Which of the following data security technology can ensure i...
Question 15: George was conducting a recovery drill test as a part of his...
Question 16: Malone is finishing up his incident handling plan for IT bef...
Question 17: Which of the following provides a set of voluntary recommend...
Question 18: David, a network and system admin, encrypted all the files i...
Question 19: Henry needs to design a backup strategy for the organization...
Question 20: Mark is monitoring the network traffic on his organization's...
Question 21: Which of the following is a database encryption feature that...
Question 22: What represents the ability of an organization to respond un...
Question 23: Which IEEE standard does wireless network use?...
Question 24: Ryan, a network security engineer, after a recent attack, is...
Question 25: Management asked their network administrator to suggest an a...
Question 26: In _______ mechanism, the system or application sends log re...
Question 27: Who offers formal experienced testimony in court?...
Question 28: Which of the following network security controls can an admi...
Question 29: If an organization has decided to consume PaaS Cloud service...
Question 30: HexCom, a leading IT Company in the USA, realized that their...
Question 31: In ______ method, event logs are arranged in the form of a c...
Question 32: Which type of information security policy addresses the impl...
Question 33: Daniel is giving training on designing and implementing a se...
Question 34: Which encryption algorithm does S/MIME protocol implement fo...
Question 35: Which RAID level system provides very good data performance ...
Question 36: The GMT enterprise is working on their internet and web usag...
Question 37: An enterprise recently moved to a new office and the new nei...
Question 38: Implementing access control mechanisms, such as a firewall, ...
Question 39: Michael decides to view the-----------------to track employe...
Question 40: Elden is working as a network administrator at an IT company...
Question 41: Which of the following is true regarding any attack surface?...
Question 42: Which of the following helps prevent executing untrusted or ...
Question 43: Which of the following is an example of MAC model?...
Question 44: Which of the following indicators refers to potential risk e...
Question 45: _______________ is a structured and continuous process which...
Question 46: Which component of the data packets is encrypted in Transpor...
Question 47: Eric is receiving complaints from employees that their syste...
Question 48: In MacOS, how can the user implement disk encryption?...
Question 49: Which protocol would the network administrator choose for th...
Question 50: Identify the attack where an attacker manipulates or tricks ...
Question 51: Identity the method involved in purging technique of data de...
Question 52: James was inspecting ARP packets in his organization's netwo...
Question 53: Which among the following control and manage the communicati...
Question 54: You are using Wireshark to monitor your network traffic and ...
Question 55: Frank is a network technician working for a medium-sized law...
Question 56: Fargo, head of network defense at Globadyne Tech, has discov...
Question 57: Phishing-like attempts that present users a fake usage bill ...
Question 58: How can one identify the baseline for normal traffic?...
Question 59: Identify the spread spectrum technique that multiplies the o...
Question 60: Frank installed Wireshark at all ingress points in the netwo...
Question 61: Simran is a network administrator at a start-up called Revol...
Question 62: Stephanie is currently setting up email security so all comp...
Question 63: John wants to implement a firewall service that works at the...
Question 64: Consider a scenario consisting of a tree network. The root N...
Question 65: Which BC/DR activity includes action taken toward resuming a...
Question 66: What is Azure Key Vault?
Question 67: Which of the following helps in viewing account activity and...
Question 68: Kyle is an IT consultant working on a contract for a large e...
Question 69: The Circuit-level gateway firewall technology functions at w...
Question 70: As a network administrator, you have implemented WPA2 encryp...
Question 71: Daniel is monitoring network traffic with the help of a netw...
Question 72: Your company is planning to use an uninterruptible power sup...
Question 73: Which of the following network monitoring techniques require...
Question 74: Which biometric technique authenticates people by analyzing ...
Question 75: Kelly is taking backups of the organization's data. Currentl...
Question 76: Simon had all his systems administrators implement hardware ...
Question 77: Which mobile-use approach allows an organization's employees...
Question 78: What should an administrator do while installing a sniffer o...
Question 79: The--------------protocol works in the network layer and is ...
Question 80: Which of following are benefits of using loT devices in loT-...
Question 81: An employee of a medical service company clicked a malicious...
Question 82: On which layer of the OSI model does the packet filtering fi...
Question 83: Which of the information below can be gained through network...
Question 84: Which of the following statement holds true in terms of cont...
Question 85: Which of the following attack signature analysis techniques ...
Question 86: Which of the following is consumed into SIEM solutions to ta...
Question 87: Which of the following entities is responsible for cloud sec...
Question 88: Chris is a senior network administrator. Chris wants to meas...
Question 89: Which type of wireless network attack is characterized by an...
Question 90: Which of the following things need to be identified during a...
Question 91: Which command list all ports available on a server?...
Question 92: Byron, a new network administrator at FBI, would like to ens...
Question 93: Which category of suspicious traffic signatures includes SYN...
Question 94: Identify the minimum number of drives required to setup RAID...
Question 95: As a network administrator, you have implemented WPA2 encryp...
Question 96: Match the following NIST security life cycle components with...
Question 97: Rosa is working as a network defender at Linda Systems. Rece...
Question 98: The CEO of Max Rager wants to send a confidential message re...
Question 99: Which firewall technology provides the best of both packet f...
Question 100: James wants to implement certain control measures to prevent...
Question 101: Which among the following tools can help in identifying IoEs...
Question 102: Hacktivists are threat actors, who can be described as -----...
Question 103: Henry, head of network security at Gentech, has discovered a...
Question 104: A CCTV camera, which can be accessed on the smartphone from ...
Question 105: John, a network administrator, is configuring Amazon EC2 clo...
Question 106: An US-based organization decided to implement a RAID storage...
Question 107: Which of the following is not part of the recommended first ...
Question 108: To provide optimum security while enabling safe/necessary se...
Question 109: Heather has been tasked with setting up and implementing VPN...
Question 110: James is a network administrator working at a student loan c...
Question 111: Which Internet access policy starts with all services blocke...
Question 112: Larry is responsible for the company's network consisting of...
Question 113: Which OSI layer does a Network Interface Card (NIC) work on?...
Question 114: Patrick wants to change the file permission of a file with p...
Question 115: What is the best way to describe a mesh network topology?...
Question 116: Dan and Alex are business partners working together. Their B...
Question 117: Blake is working on the company's updated disaster and busin...
Question 118: Which of the following is NOT an AWS Shared Responsibility M...
Question 119: What is the IT security team responsible for effectively man...
Question 120: USB ports enabled on a laptop is an example of____...
Question 121: A popular e-commerce company has recently received a lot of ...
Question 122: You are responsible for network functions and logical securi...
Question 123: James is working as a Network Administrator in a reputed com...
Question 124: How is the chip-level security of an IoT device achieved?...
Question 125: Which of the following network security protocols protects f...
Question 126: A newly joined network administrator wants to assess the org...
Question 127: Riya bought some clothes and a watch from an online shopping...
Question 128: Identify the correct statements regarding a DMZ zone:...
Question 129: Bryson is the IT manager and sole IT employee working for a ...
Question 130: To secure his company's network, Tim the network admin, inst...
Question 131: Alex is administrating the firewall in the organization's ne...
Question 132: Which of the following defines the extent to which an interr...
Question 133: Which of the following intrusion detection techniques observ...
Question 134: Assume that you are working as a network defender at the hea...
Question 135: Who acts as an intermediary to provide connectivity and tran...
Question 136: Which of the following Event Correlation Approach checks and...
Question 137: Which firewall technology can filler application-specific co...
Question 138: Which of the following systems includes an independent NAS H...
Question 139: Jorge has developed a core program for a mobile application ...
Question 140: Which authentication technique involves mathematical pattern...
Question 141: A stateful multilayer inspection firewall combines the aspec...
Question 142: Which risk management phase helps in establishing context an...
Question 143: Brendan wants to implement a hardware based RAID system in h...
Question 144: Which of the following technologies can be used to leverage ...
Question 145: A company wants to implement a data backup method which allo...
Question 146: Which phase of vulnerability management deals with the actio...