A Linux administrator creates new user accounts using the useradd command. Which two files on the system contain the new user account information?  (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A Linux administrator creates new user accounts using the useradd command. Which two files on the system contain the new user account information?  (Choose two.) /etc/users/groups /etc/ passwd /users/account /etc/users /etc/ shadow…

Continue ReadingA Linux administrator creates new user accounts using the useradd command. Which two files on the system contain the new user account information?  (Choose two.)

An e-commerce website encourages users to authenticate using their individual social media account credentials. What type of a security solution enables users to use the same credentials to login to multiple networks belonging to different enterprises?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

An e-commerce website encourages users to authenticate using their individual social media account credentials. What type of a security solution enables users to use the same credentials to login to…

Continue ReadingAn e-commerce website encourages users to authenticate using their individual social media account credentials. What type of a security solution enables users to use the same credentials to login to multiple networks belonging to different enterprises?

A network technician is assigned the task of hardening a Cisco switch before placing it into the LAN. The technician configures and encrypts the user and privilege mode passwords, creates a new management VLAN, and verifies that the IOS is up-to-date. What action should the technician take to ensure that remote access to the system is secure during transmission?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network technician is assigned the task of hardening a Cisco switch before placing it into the LAN. The technician configures and encrypts the user and privilege mode passwords, creates…

Continue ReadingA network technician is assigned the task of hardening a Cisco switch before placing it into the LAN. The technician configures and encrypts the user and privilege mode passwords, creates a new management VLAN, and verifies that the IOS is up-to-date. What action should the technician take to ensure that remote access to the system is secure during transmission?

A network technician is preparing a number of laptops to be loaned to employees while they are traveling. These employees will not be logging into the corporate directory server when they are away from the office. Which type of software should be configured on the laptops in order to filter incoming and outgoing network connections?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network technician is preparing a number of laptops to be loaned to employees while they are traveling. These employees will not be logging into the corporate directory server when…

Continue ReadingA network technician is preparing a number of laptops to be loaned to employees while they are traveling. These employees will not be logging into the corporate directory server when they are away from the office. Which type of software should be configured on the laptops in order to filter incoming and outgoing network connections?

What is a benefit of a Type 1 hypervisor implementation over a Type 2 hypervisor environment?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a benefit of a Type 1 hypervisor implementation over a Type 2 hypervisor environment? Type 1 hypervisor systems are immune to hacker attacks and VM escape exploits. Type…

Continue ReadingWhat is a benefit of a Type 1 hypervisor implementation over a Type 2 hypervisor environment?

A small company uses a public cloud service provider to host an online store. The online store uses a web application as the front end and a database as the backend. When a customer places an order in the web form, the request is then sent to the database to check the inventory, current price, and customer information thereby completing the order. The IT manager is learning that threat attackers may launch attacks by injecting malformed data into the web application. What is a security coding technique that the company can use to minimize such attacks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A small company uses a public cloud service provider to host an online store. The online store uses a web application as the front end and a database as the…

Continue ReadingA small company uses a public cloud service provider to host an online store. The online store uses a web application as the front end and a database as the backend. When a customer places an order in the web form, the request is then sent to the database to check the inventory, current price, and customer information thereby completing the order. The IT manager is learning that threat attackers may launch attacks by injecting malformed data into the web application. What is a security coding technique that the company can use to minimize such attacks?

A software company uses a public cloud service for hosting software development and deployment services. The company is concerned that software code in development might leak to competitors and result in the loss of intellectual property. Which two security coding techniques can the company implement to address the concern? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A software company uses a public cloud service for hosting software development and deployment services. The company is concerned that software code in development might leak to competitors and result…

Continue ReadingA software company uses a public cloud service for hosting software development and deployment services. The company is concerned that software code in development might leak to competitors and result in the loss of intellectual property. Which two security coding techniques can the company implement to address the concern? (Choose two.)

You are asked for advice on how to best prevent unauthorized hosts from accessing the home network of employees. Which of the following security measures do you think would be most effective?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

You are asked for advice on how to best prevent unauthorized hosts from accessing the home network of employees. Which of the following security measures do you think would be…

Continue ReadingYou are asked for advice on how to best prevent unauthorized hosts from accessing the home network of employees. Which of the following security measures do you think would be most effective?

What are the most effective ways to defend against malware?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are the most effective ways to defend against malware? Select two correct answers Implement a VPN Implement RAID Install and update antivirus software Implement network firewalls Implement strong passwords…

Continue ReadingWhat are the most effective ways to defend against malware?

A cyberanalyst is looking for an open source malware analysis tool that can run locally on the network. Which tool would meet the needs of the cyberanalyst?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A cyberanalyst is looking for an open source malware analysis tool that can run locally on the network. Which tool would meet the needs of the cyberanalyst? AMP Cuckoo Sandbox…

Continue ReadingA cyberanalyst is looking for an open source malware analysis tool that can run locally on the network. Which tool would meet the needs of the cyberanalyst?

What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.) digital certificates pre-shared key generation symmetric encryption algorithms intrusion prevention system certificate…

Continue ReadingWhat are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)

What is used by PKI entities to verify the validity of a digital certificate?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is used by PKI entities to verify the validity of a digital certificate? CRL SSL X.509 S/MIME Explanation & Hint: The Certificate Revocation List (CRL) contains a list of…

Continue ReadingWhat is used by PKI entities to verify the validity of a digital certificate?

Because of a pandemic, a company decides to let employees work from home. What security technology should be implemented to ensure that data communications between the employees and the company’s network remain confidential?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Because of a pandemic, a company decides to let employees work from home. What security technology should be implemented to ensure that data communications between the employees and the company's…

Continue ReadingBecause of a pandemic, a company decides to let employees work from home. What security technology should be implemented to ensure that data communications between the employees and the company’s network remain confidential?

Which method of wireless authentication can take advantage of identity verification using a Radius server?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which method of wireless authentication can take advantage of identity verification using a Radius server? WPA-Personal WEP Open WPA2-Enterprise Explanation & Hint: Although more complicated to set up, WPA2-Enterprise provides…

Continue ReadingWhich method of wireless authentication can take advantage of identity verification using a Radius server?

Which of the following protocols use the Advanced Encryption Standard (AES)?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which of the following protocols use the Advanced Encryption Standard (AES)? Select two correct answers WPA TKIP WEP EAP WPA2 Explanation & Hint: AES is the encryption method used by WPA2.…

Continue ReadingWhich of the following protocols use the Advanced Encryption Standard (AES)?

What names are given to a database where all cryptocurrency transactions are recorded?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What names are given to a database where all cryptocurrency transactions are recorded? Select two correct answers Spreadsheet Ledger Blockchain Table Explanation & Hint: When a cryptocurrency transation occurs, the…

Continue ReadingWhat names are given to a database where all cryptocurrency transactions are recorded?

What type of attack disrupts services by overwhelming network devices with bogus traffic?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of attack disrupts services by overwhelming network devices with bogus traffic? Brute force Zero-day DDoS Port scans Explanation & Hint: A Denial of Service attack or a Distributed…

Continue ReadingWhat type of attack disrupts services by overwhelming network devices with bogus traffic?

What information must now be entered to specify which traffic can be sent across the zones and associate it with the zone-pair configuration?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A technician enters the commands shown to configure a zone-pair between two security zones on a router. Router(config)# zone-pair security PRIV-PUB source PRIVATE destination PUBLIC Router(config-sec-zone-pair)# What information must now be…

Continue ReadingWhat information must now be entered to specify which traffic can be sent across the zones and associate it with the zone-pair configuration?