Which IETF standard defines the PKI digital certificate format? X.500 X.509 * LDAP SSL/TLS Which two statements correctly describe certificate classes used in the PKI? (Choose…
Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources? Accessibility Accounting *…
In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services? DoS * MITM Session hijacking Address spoofing Which network…
A network administrator detects unknown sessions involving port 21 on the network. What could be causing this security breach? An FTP Trojan horse is executing. *…
Which network service synchronizes the time across all devices on the network? NetFlow Syslog NTP * SNMP Which network service allows administrators to monitor and manage…
If the default gateway is configured incorrectly on the host, what is the impact on communications? The host is unable to communicate on the local network.…
Which method can be used to harden a computing device? Allow USB auto-detection. Force periodic password changes. * Allow default services to remain enabled. Update patches…
Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the…
What is cyberwarfare? It is an attack only on military targets. It is an attack on a major corporation. It is an attack that only involves…