Question 26

A security analyst is working on a project to implement a solution that monitors network communications and provides alerts when abnormal behavior is detected Which of the following is the security analyst MOST likely implementing?
  • Question 27

    After reluming from a conference, a user's laptop has been operating slower than normal and overheating and the fans have been running constantly Dunng the diagnosis process, an unknown piece of hardware is found connected to the laptop's motherboard Which of the following attack vectors was exploited to install the hardware?
  • Question 28

    A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.
    Perform the following steps:
    1. Configure the RADIUS server.
    2. Configure the WiFi controller.
    3. Preconfigure the client for an incoming guest. The guest AD credentials are:
    User: guest01
    Password: guestpass



    Question 29

    Data exftitration analysis indicates that an attacker managed to download system configuration notes from a web server. The web-server logs have been deleted, but analysts have determined that the system configuration notes were stored in the database administrator's folder on the web server Which of the following attacks explains what occurred? (Select TWO)
  • Question 30

    Digital signatures use asymmetric encryption. This means the message is encrypted with: