Xxxsecurity

Question: Matt, a security administrator, wants to implement a secure wireless network. Which of the following is the MOST secure wireless protocol?

  1. WPA

  2. b. WPA2

  3. c. AES

  4. d. WEP

  5. Answer: WPA2

  6. Question: In which of the following access control types does the operating system data classification determine who has access to certain resources?

  7. a. role based access control

  8. b. discretionary access control

  9. c. mandatory access control

  10. d. rule based access control

  11. Answer: mandatory access control

  12. Question:

  13. Answer: isolate the management network

  14. Question: Which of the following wireless attacks MOST likely targets a smart phone?

  15. a. IV attack

  16. b. war driving

  17. c. whaling

  18. d. bluesnarfing

  19. Answer: bluesnarfing

  20. Question:

  21. Answer: discretionary access control

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.