Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which security measure can prevent unauthorized devices from automatically connecting to a corporate network through unused switch ports?

A.

Port security

B.

VLAN trunking

C.

NAT

D.

VPN

You are going to perform a penetration test on a company LAN. As part of your preparation, you access the company’s websites, view webpage source code, and run internet searches to uncover domain information. You also use social media to gather details about the company and its employees.

Which type of reconnaissance activities are you performing?

A.

Passive

B.

Active

C.

Offline

D.

Invasive

What is the main purpose of a disaster recovery plan as compared to a business continuity plan?

A.

Limiting operational downtime.

B.

Keeping the business open in some capacity during a disaster.

C.

Restoring data access and an IT infrastructure as quickly as possible.

D.

Allowing staff to continue to serve customers throughout a disaster.

You are collecting data after a suspected intrusion on the local LAN.

You need to capture incoming IP packets to a file for an investigator to analyze.

Which two tools should you use?(Choose 2.)

A.

Wireshark

B.

tcpdump

C.

Nmap

D.

netstat

A restaurant installs a second wireless router that only employees can use.

Which statement describes how to securely configure the new router?

A.

Configure the new router to filter IP addresses.

B.

Configure the SSID with broadcast disabled.

C.

Configure a higher signal strength to allow coverage in the parking lot.

D.

Configure the SSID with the same SSID used by the customer router.