1. Given the log output: Max 15 00:15:23.431 CRT: #SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: msmith] [Source: 10.0.12.45] [localport: 23] at 00:15:23:431 CET Sun Mar 15 2015 Which of the following should the network administrator do to protect data security?
A) Disable telnet and enable SSH B) Configure port security for logons C) Configure an AAA server D) Disable password and enable RSA authentication
2. Joe,an employee,wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe - s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to install the application? (Select two.)(Select 2answers)
A) Rooting/jailbreaking B) Sideloading C) Tethering D) Near-field communication. E) Ad-hoc connections
3. As part of a corporate merger,two companies are combining resources. As a result,they must transfer files through the Internet in a secure manner. Which of the following protocols would BEST meet this objective? (Choose two.)(Select 2answers)
A) LDAPS B) SRTP C) SFTP D) HTTPS E) DNSSEC
4. Joe,a contractor,is hired by a firm to perform a penetration test against the firm - s infrastructure. When conducting the scan,he receives only the network diagram and the network list to scan against the network. Which of the following scan types is Joe performing?
A) White box B) Automated C) Authenticated D) Gray box
5. A system administrator wants to provide for and enforce wireless access accountability during events where external speakers are invited to make presentations to a mixed audience of employees and non-employees. Which of the following should the administrator implement?
A) Shared accounts B) Sponsored guest C) Preshared passwords D) Least privilege
Leave a comment