Podcast
Questions and Answers
What is the purpose of a Wi-Fi Protected Setup (WPS) attack?
What is the purpose of a Wi-Fi Protected Setup (WPS) attack?
- To assign unique digital identifiers to endpoint devices
- To simplify account administration
- To discover an access point WPS PIN by guessing PIN numbers (correct)
- To force users to pay for access
Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?
Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?
- Domain-assigned privileges
- User-assigned privileges
- Network-assigned privileges
- Group-based privileges (correct)
What do Mobile Device Management (MDM) applications do with endpoint devices?
What do Mobile Device Management (MDM) applications do with endpoint devices?
- Assign unique digital identifiers (correct)
- Force users to acknowledge usage policies
- Connect to a server hosting the desktop
- Simplify account administration
What is the main function of a virtual desktop infrastructure (VDI)?
What is the main function of a virtual desktop infrastructure (VDI)?
Which of the following is NOT a valid administration practice according to the text?
Which of the following is NOT a valid administration practice according to the text?
What does a WPS attack attempt to guess?
What does a WPS attack attempt to guess?
What is the best method to add a second authentication factor for users launching the gcga application?
What is the best method to add a second authentication factor for users launching the gcga application?
Which control can detect malicious traffic after it enters a network?
Which control can detect malicious traffic after it enters a network?
How does an authentication application differ from push notifications in terms of user-friendliness?
How does an authentication application differ from push notifications in terms of user-friendliness?
What can a Trusted Platform Module (TPM) provide for regarding data security?
What can a Trusted Platform Module (TPM) provide for regarding data security?
Which hardware device can generate and store RSA keys used with servers?
Which hardware device can generate and store RSA keys used with servers?
Why can't an intrusion detection system (IDS) deter attacks according to the text?
Why can't an intrusion detection system (IDS) deter attacks according to the text?
What does remote wipe do to a lost device?
What does remote wipe do to a lost device?
Why won't geolocation technologies protect data on a lost device?
Why won't geolocation technologies protect data on a lost device?
What does an air gap provide in terms of system isolation?
What does an air gap provide in terms of system isolation?
What does a screened subnet provide in network security?
What does a screened subnet provide in network security?
What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?
What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?
What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?
What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?
Which method ensures that 2FA passwords expire after 30 seconds?
Which method ensures that 2FA passwords expire after 30 seconds?
What is the main advantage of removing all shared accounts?
What is the main advantage of removing all shared accounts?
Why shouldn't generic accounts be used?
Why shouldn't generic accounts be used?
What is the primary purpose of role-based privileges?
What is the primary purpose of role-based privileges?
What does a sandbox primarily provide for testing updates?
What does a sandbox primarily provide for testing updates?
What characteristic defines a single sign-on (SSO) solution?
What characteristic defines a single sign-on (SSO) solution?
Which solution is recommended to protect laptop drives against data theft without user interaction?
Which solution is recommended to protect laptop drives against data theft without user interaction?
What type of attack attempts to discover the passphrase by targeting the initialization vector?
What type of attack attempts to discover the passphrase by targeting the initialization vector?
In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?
In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?
What is the main purpose of a split tunnel in a VPN configuration?
What is the main purpose of a split tunnel in a VPN configuration?
Which type of attack attempts to access information on Bluetooth devices?
Which type of attack attempts to access information on Bluetooth devices?
What is the best solution to implement for protecting against data theft according to the text?
What is the best solution to implement for protecting against data theft according to the text?