Question 366

A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)
  • Question 367

    In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software.
    Which of the following is the BEST action for the technician to take?
  • Question 368

    A company located in a metropolitan area is surrounded by different public businesses (e g., coffee shops library). The security team is concerned that unauthorized neighboring customers will connect to the corporate WiFi, which could result in data breaches. Which of the following is the BEST solution to reduce the security vulnerability with the least administrative effort?
  • Question 369

    A technician needs to configure network shares on users' computers when they log on. The technician wrote the script with the net use command. Which of the following script file types is the technician writing.
  • Question 370

    Which of the following is required to receive GPOs from a system's centralized servers?