What should you do to a user account if the user goes on an extended vacation?
Blog
When setting up a new wireless access point, what is the fir…
When setting up a new wireless access point, what is the first configuration change that should be made?
Travis is sending a highly confidential email to Craig that…
Travis is sending a highly confidential email to Craig that contains sensitive data. Which of the following should Travis implement to ensure that only Craig is able to read the email?
Which of the following identification and authentication fac…
Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?
What is the most obvious means of providing non-repudiation…
What is the most obvious means of providing non-repudiation in a cryptography system?
A user is able to access privileged administrative features…
A user is able to access privileged administrative features with an account that is not granted administrator rights. Which type of vulnerability is this?
You run a small network for your business that has a single…
You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
Which networking model is based on peer-to-peer networking?
Which networking model is based on peer-to-peer networking?
Which of the following is susceptible to social engineering…
Which of the following is susceptible to social engineering exploits?
Which of the following actions should you take to reduce the…
Which of the following actions should you take to reduce the attack surface of a server?