1. When connected to a secure WAP,which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
A) AES B) MD5 C) WEP D) DES
2. The help desk received a call after hours from an employee who was attempting to log into the payroll server remotely. When the help desk returned the call the next morning,the employee was able to log into the server remotely without incident. However,the incident occurred again the next evening. Which of the following BEST describes the cause of the issue?
A) The employee does not have the rights needed to access the database remotely B) The password expired on the account and needed to be reset C) The employee's account was locked out and needed to be unlocked D) Time-of-day restrictions prevented the account from logging in
3. The SSID broadcast for a wireless router has been disabled but a network administrator notices that unauthorized users are accessing the wireless network. The administer has determined that attackers are still able to detect the presence of the wireless network despite the fact the SSID has been disabled. Which of the following would further obscure the presence of the wireless network?
A) Disable responses to a broadcast probe request B) Upgrade the encryption to WPA or WPA2 C) Reroute wireless users to a honeypot D) Create a non-zero length SSID for the wireless router
4. Which of the following can affect electrostatic discharge in a network operations center?
A) Fire suppression B) Environmental monitoring C) Humidity controls D) Proximity card access
5. When attackers use a compromised host as a platform for launching attacks deeper into a company's network,it is said that they are:
A) pivoting B) escalating privilege C) becoming persistent D) fingerprinting
Leave a comment