Which of the following is a technique used to attack an Ethernet wired or wireless network?
Correct Answer:
D
🗳️
Which of the following refers to encrypted text?
Correct Answer:
D
🗳️
Which of the following are the benefits of information classification for an organization?
Correct Answer:
AC
🗳️
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
Correct Answer:
A
🗳️
Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ABCD
🗳️
Which of the following protocols is used to verify the status of a certificate?
Correct Answer:
D
🗳️
SIMULATION -
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
Correct Answer:
32
You work as a Network Administrator for NetTech Inc. The company has a network that consists of 200 client computers and ten database servers. One morning, you find that a hacker is accessing unauthorized data on a database server on the network. Which of the following actions will you take to preserve the evidences?
Each correct answer represents a complete solution. Choose three.
Correct Answer:
BCD
🗳️
Which of the following heights of fence deters only casual trespassers?
Correct Answer:
A
🗳️
model is true?
Correct Answer:
A
🗳️