<< Prev Question Next Question >>

Question 12/73

The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the WPS PIN.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (73q)
Question 1: A mail system administrator scans for viruses in incoming em...
Question 2: What is the standard or basic collection of NTFS permissions...
1 commentQuestion 3: Coho Winery wants to increase their web presence and hires y...
Question 4: HOTSPOT For each of the following statements, select Yes if ...
Question 5: HOTSPOT For each of the following statements, select Yes if ...
Question 6: HOTSPOT For each of the following statements, select Yes if ...
Question 7: Which two are included in an enterprise antivirus program? (...
Question 8: You are an intern at Wide World Importers and help manage 10...
Question 9: HOTSPOT For each of the following statements, select Yes if ...
Question 10: The purpose of Microsoft Baseline Security Analyzer is to:...
Question 11: The primary purpose of Network Access Protection (NAP) is to...
Question 12: The WPA2 PreShared Key (PSK) is created by using a passphras...
Question 13: HOTSPOT For each of the following statements, select Yes if ...
Question 14: You are volunteering at an organization that gets a brand ne...
Question 15: HOTSPOT For each of the following statements, select Yes if ...
Question 16: Physically securing servers prevents:...
Question 17: What are two attributes that an email message may contain th...
Question 18: HOTSPOT For each of the following statements, select Yes if ...
Question 19: You need to install a domain controller in a branch office. ...
Question 20: HOTSPOT You are at school and logged in to a Windows 7 compu...
Question 21: HOTSPOT For each of the following statements, select Yes if ...
Question 22: HOTSPOT For each of the following statements, select Yes if ...
Question 23: Cookies impact security by enabling: (Choose two.)...
Question 24: You are setting up Remote Desktop on your computer. Your com...
Question 25: You need to limit the programs that can run on client comput...
Question 26: Role separation improves server security by:...
Question 27: A digitally signed e-mail message:...
Question 28: Which two security settings can be controlled by using group...
Question 29: A user who receives a large number of emails selling prescri...
Question 30: Your company requires that users type a series of characters...
Question 31: Which enables access to all of the logged-in user's capabili...
Question 32: Which password attack uses all possible alpha numeric combin...
Question 33: Many Internet sites that you visit require a user name and p...
Question 34: You create a web server for your school. When users visit yo...
Question 35: HOTSPOT For each of the following statements, select Yes if ...
Question 36: Before you deploy Network Access Protection (NAP), you must ...
Question 37: What are three major attack vectors that a social engineerin...
Question 38: Which is the minimum requirement to create BitLocker-To-Go m...
Question 39: HOTSPOT You are preparing a local audit policy for your work...
Question 40: A brute force attack:
Question 41: What does implementing Windows Server Update Services (WSUS)...
Question 42: The client computers on your network are stable and do not n...
Question 43: What is the primary advantage of using Active Directory Inte...
Question 44: E-mail spoofing:
Question 45: HOTSPOT Your supervisor asks you to review file permission s...
Question 46: In Internet Explorer 8, the InPrivate Browsing feature preve...
Question 47: What does NAT do?
Question 48: What is an example of non-propagating malicious code?...
Question 49: For each of the following statements, select Yes if the stat...
Question 50: Which enables you to change the permissions on a folder?...
Question 51: Which provides the highest level of security in a firewall?...
Question 52: Passwords that contain recognizable words are vulnerable to ...
Question 53: A group of users has access to Folder A and all of its conte...
Question 54: HOTSPOT Alice sends her password to the game server in plain...
Question 55: Windows Firewall is a built-in. host-based, stateless firewa...
Question 56: HOTSPOT For each of the following statements, select Yes if ...
Question 57: Bridging is a process of sending packets from source to dest...
Question 58: The Graphic Design Institute hires you to help them set up a...
Question 59: To prevent users from copying data to removable media, you s...
Question 60: What are three examples of two-factor authentication? (Choos...
Question 61: The primary method of authentication in an SSL connection is...
Question 62: You want to make your computer resistant to online hackers a...
Question 63: The purpose of User Account Control (UAC) is to:...
Question 64: Humongous Insurance is an online healthcare insurance compan...
Question 65: To keep third-party content providers from tracking your mov...
Question 66: HOTSPOT You are an intern for a company where your manager w...
Question 67: The purpose of a digital certificate is to verify that a:...
Question 68: The Windows Firewall protects computers from unauthorized ne...
Question 69: Keeping a server updated:
Question 70: What is a common method for password collection?...
Question 71: Account lockout policies are used to prevent which type of s...
Question 72: The default password length for a Windows Server domain cont...
Question 73: You are trying to connect to an FTP server on the Internet f...