Podcast
Questions and Answers
What is the purpose of a Wi-Fi Protected Setup (WPS) attack?
What is the purpose of a Wi-Fi Protected Setup (WPS) attack?
Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?
Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?
What do Mobile Device Management (MDM) applications do with endpoint devices?
What do Mobile Device Management (MDM) applications do with endpoint devices?
What is the main function of a virtual desktop infrastructure (VDI)?
What is the main function of a virtual desktop infrastructure (VDI)?
Signup and view all the answers
Which of the following is NOT a valid administration practice according to the text?
Which of the following is NOT a valid administration practice according to the text?
Signup and view all the answers
What does a WPS attack attempt to guess?
What does a WPS attack attempt to guess?
Signup and view all the answers
What is the best method to add a second authentication factor for users launching the gcga application?
What is the best method to add a second authentication factor for users launching the gcga application?
Signup and view all the answers
Which control can detect malicious traffic after it enters a network?
Which control can detect malicious traffic after it enters a network?
Signup and view all the answers
How does an authentication application differ from push notifications in terms of user-friendliness?
How does an authentication application differ from push notifications in terms of user-friendliness?
Signup and view all the answers
What can a Trusted Platform Module (TPM) provide for regarding data security?
What can a Trusted Platform Module (TPM) provide for regarding data security?
Signup and view all the answers
Which hardware device can generate and store RSA keys used with servers?
Which hardware device can generate and store RSA keys used with servers?
Signup and view all the answers
Why can't an intrusion detection system (IDS) deter attacks according to the text?
Why can't an intrusion detection system (IDS) deter attacks according to the text?
Signup and view all the answers
What does remote wipe do to a lost device?
What does remote wipe do to a lost device?
Signup and view all the answers
Why won't geolocation technologies protect data on a lost device?
Why won't geolocation technologies protect data on a lost device?
Signup and view all the answers
What does an air gap provide in terms of system isolation?
What does an air gap provide in terms of system isolation?
Signup and view all the answers
What does a screened subnet provide in network security?
What does a screened subnet provide in network security?
Signup and view all the answers
What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?
What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?
Signup and view all the answers
What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?
What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?
Signup and view all the answers
Which method ensures that 2FA passwords expire after 30 seconds?
Which method ensures that 2FA passwords expire after 30 seconds?
Signup and view all the answers
What is the main advantage of removing all shared accounts?
What is the main advantage of removing all shared accounts?
Signup and view all the answers
Why shouldn't generic accounts be used?
Why shouldn't generic accounts be used?
Signup and view all the answers
What is the primary purpose of role-based privileges?
What is the primary purpose of role-based privileges?
Signup and view all the answers
What does a sandbox primarily provide for testing updates?
What does a sandbox primarily provide for testing updates?
Signup and view all the answers
What characteristic defines a single sign-on (SSO) solution?
What characteristic defines a single sign-on (SSO) solution?
Signup and view all the answers
Which solution is recommended to protect laptop drives against data theft without user interaction?
Which solution is recommended to protect laptop drives against data theft without user interaction?
Signup and view all the answers
What type of attack attempts to discover the passphrase by targeting the initialization vector?
What type of attack attempts to discover the passphrase by targeting the initialization vector?
Signup and view all the answers
In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?
In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?
Signup and view all the answers
What is the main purpose of a split tunnel in a VPN configuration?
What is the main purpose of a split tunnel in a VPN configuration?
Signup and view all the answers
Which type of attack attempts to access information on Bluetooth devices?
Which type of attack attempts to access information on Bluetooth devices?
Signup and view all the answers
What is the best solution to implement for protecting against data theft according to the text?
What is the best solution to implement for protecting against data theft according to the text?
Signup and view all the answers