Question 406

Which of the following wireless security protocols supports the use of a 40-bit encryption key?
  • Question 407

    An administrator created a connection to a private network using TLS 1.2. The Linux servers on the network do not support secure protocols. Which of the following will the administrator MOST likely use to log in to these servers?
  • Question 408

    The Chief Information Security Officer (CISO) wants to ensure the company Is prepared in case of a ransomware attack. The CISO has requested network vulnerability scans, firewall audits, and ACL logs. Which of the following
    'should the CISO also request?
  • Question 409

    A company is implementing multifactor authentication and requires a solution that utilizes TCP. Which of the following will the company MOST likely select?
  • Question 410

    A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software Which of the following would be MOST important during this phase of the request process?