Question 76

You have just set up a wireless network for customers at a coffee shop. Which of the following are good
security measures to implement? Each correct answer represents a complete solution. (Choose two.)
  • Question 77

    Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?
  • Question 78

    Which of the following is a digital telephone/telecommunication network that carries voice, data, and video over an existing telephone network infrastructure?
  • Question 79

    A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing? Each correct answer represents a complete solution. Choose all that apply.
  • Question 80

    Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?