Sample Questions:
The system administrator was notified that many users are experiencing difficulties in connecting to the wireless network. They take a new laptop and go physically to the access point and connect without problems. Which of the following options is the most likely cause?
The certificate used to authenticate users, has been committed and revoked.
Several drivers stationed exhausted military all available pool IP addresses to avoid access.
An attacker won access to the access point and changes the encryption keys.
The unauthorized access point has been configured to run on the same channel.
None
The system administrator wishes to perform a hardware-based encryption technique, which can also be used for the code signing. They can achieve this:
Using an existing TPM.
Setting Safe Sandbox applications.
Setting Safe Sandbox applications.
Encrypt full disc strength.
Transfer of data and applications in the cloud.
The Chief of Information Safety (CISO) decided that the entire IT system with the data on the credit card will be separated from the main corporate network to avoid unauthorized access and that access must be registered in the IT system. Which of the following would fulfill better satisfy the requirements of Cisoà Â, ¬ YS?
Interceptors
NDI
Firewalls
Proxy Web.
The switch of layer 2
One of the servers in the network to stop responding due to lack of memory available. Server administrators do not have a clear definition of what the place of action should be, according to the available memory. Which of the following would be better to maintain this case of occurrence?
Configuration of a protocol analyzer
Set a performance baseline
Monthly review of the system monitor.
Overview Monitoring monthly performance
None
The system administrator to implement the security of updated controls for the network, to limit the risk of attack. The security manager is concerned that the controls continue to work properly to maintain an appropriate level of safety. Which of the following strategies to reduce risk is the most important thing for the security manager?
Users' rights
Compliance policy
Routine checks
change management
None
The Security Manager received a report that an employee participated in the illegal activity and the data stored in the workstation of the hard drive. During the investigation of criminal cases in the application of local law confiscated the hard drive as evidence. Which of the following legal procedures involved?
Supply chain
Image system
Take Hashes.
The volatility of the order.
None
The environmental control measures include which of the following?
Access to the list
Turning on
Motion detection
EMI shield
None