Question 356

Company A has acquired Company
B. Company A has different domains spread globally, and typically migrates its acquisitions infrastructure under its own domain infrastructure. Company B, however, cannot be merged into Company A's domain infrastructure.
Which of the following methods would allow the two companies to access one another's resources?
  • Question 357

    Which of the following would be considered multifactor authentication?
  • Question 358

    A company utilizes 802.11 for all client connectivity within a facility. Users in one part of the building are reporting they are unable to access company resources when connected to the company SSID.
    Which of the following should the security administrator use to assess connectivity?
  • Question 359

    A penetration tester has been hired to scan a company's network for potentially active hosts. The company's IPS system blocks the ICMP echo reply and echo request packets. Which of the following can be used to scan the network?
  • Question 360

    An analyst is reviewing the following web-server log after receiving an alert from the DLP system about multiple PII records being transmitted in cleartext:

    Which of the following IP addresses in MOST likely involved in the data leakage attempt?