Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?
You are going to perform a penetration test on a company LAN. As part of your preparation, you access the company’s websites, view webpage source code, and run internet searches to uncover domain information. You also use social media to gather details about the company and its employees.
Which type of reconnaissance activities are you performing?
What is the main purpose of a disaster recovery plan as compared to a business continuity plan?
You are collecting data after a suspected intrusion on the local LAN.
You need to capture incoming IP packets to a file for an investigator to analyze.
Which two tools should you use?(Choose 2.)
A restaurant installs a second wireless router that only employees can use.
Which statement describes how to securely configure the new router?