Q: How can you increase the security of a wireless network that uses WPA2 with AES/CCMP mode? or Q: In what ways might the AES/CCMP mode of WPA2 be used to strengthen the security of a wireless network? Change the SSID to something rare and unique. Connect clients with WPS Use a long, complex passphrase that wouldn’t be found in…
-
-
What feature of enterprise-managed switches allows you to take all packets from a specified port, port range, or entire VLAN and mirror the packets to a specified switch port?
Q: What feature of enterprise-managed switches allows you to take all packets from a specified port, port range, or entire VLAN and mirror the packets to a specified switch port? or Q: What feature of switches that are administered by enterprises enables you to mirror all packets from a certain port, port range, or whole VLAN to a different switch…
-
You’re an IT support specialist tasked with setting up a NIDS system to monitor your company’s network traffic for suspicious behavior. Which constraint must you consider when you set up the NIDS?
Q: You’re an IT support specialist tasked with setting up a NIDS system to monitor your company’s network traffic for suspicious behavior. Which constraint must you consider when you set up the NIDS? or Q: As an IT support professional, it is your responsibility to configure an NIDS system to watch over network traffic in your firm and look for…
-
Complete the Qwiklab Introduction to tcpdump before answering this question. You want to use tcpdump to retrieve packets with 113.8.81.2 as the source or destination IP address and port 8080 as the source or destination port. Which command should you use?
Q: Complete the Qwiklab Introduction to tcpdump before answering this question. You want to use tcpdump to retrieve packets with 113.8.81.2 as the source or destination IP address and port 8080 as the source or destination port. Which command should you use? or Q: Prior to responding, finish the Qwiklab Introduction to tcpdump. To recover packets with source or destination…
-
Complete the Qwiklab Introduction to tcpdump before answering this question. When you run the command sudo tcpdump -i eth0 -vn, what output does tcpdump provide about each packet? Select all that apply.
Q: Complete the Qwiklab Introduction to tcpdump before answering this question. When you run the command sudo tcpdump -i eth0 -vn, what output does tcpdump provide about each packet? Select all that apply. or Q: Before responding, finish the Qwiklab Introduction to tcpdump. What output does tcpdump offer for each packet when you run the command sudo tcpdump -i eth0…
-
What is the combined sum of all attack vectors in a corporate network?
Q: What is the combined sum of all attack vectors in a corporate network? or Q: How many attack vectors are there in a business network all together? The risk The attack surface The antivirus software The Access Control List (ACL) Explanation: The attack surface refers to all the potential points of entry or vulnerabilities through which an attacker could…
-
What are Bastion hosts?
Q: What are Bastion hosts? or Q: Who are the hosts of Bastion? VLANs Users that have the ability to change firewall rules and configurations. A VPN subnet Servers that are specifically hardened and minimized to reduce what’s permitted to run on them. Explanation: Bastion hosts are designed to be exposed to the external network and act as a gateway…
-
Having detailed logging serves which of the following purposes? Select all that apply.
Q: Having detailed logging serves which of the following purposes? Select all that apply. or Q: Which of the following is served by having thorough logging? Choose every option that pertains. Event reconstruction Vulnerability detection Auditing Data protection Explanation: You may put together what happened during an incident by looking at detailed records, which can help you understand what happened…
-
What model does an antivirus software operate off of?
Q: What model does an antivirus software operate off of? or Q: Which model serves as the foundation for antivirus software? Greylist Blacklist Secure list Whitelist Explanation: In this model, the software identifies known malicious files or behaviors and prevents them from executing or spreading based on a list of known threats. It may also use a whitelist approach for…
-
What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen?
Q: What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen? or Q: What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen? Full disk encryption (FDE) OS upgrades Software patch management Key escrow…