Question 141

An organization plans to implement multifactor authentication techniques within the enterprise network architecture. Each authentication factor is expected to be a unique control.
Which of the following BEST describes the proper employment of multifactor authentication?
  • Question 142

    A bank is experiencing a DoS attack against an application designed to handle 500IP-based sessions. in addition, the perimeter router can only handle 1Gbps of traffic. Which of the following should be implemented to prevent a DoS attacks in the future?
  • Question 143

    A company wants to ensure confidential data from storage media is sanitized in such a way that the drive cannot be reused. Which of the following methods should the technician use?
    Shredding
  • Question 144

    Which of the following encryption methods does PKI typically use to securely project keys?
  • Question 145

    An organization needs to implement more stringent controls over administrator/root credentials and service accounts Requirements for the project include:
    Check-in/checkout of credentials
    * The ability to use but not know the password
    * Automated password changes
    * Logging of access to credentials
    Which of the following solutions would meet the requirements?