Question 186

A security analyst is specifying requirements for a wireless network. The analyst must explain the security features provided by various architecture choices.
Which of the following is provided by PEAP, EAP-TLS, and EAP-TTLS?
  • Question 187

    A security administrator has found a hash in the environment known to belong to malware. The administrator then finds this file to be in in the preupdate area of the OS, which indicates it was pushed from the central patch system.
    File: winx86_adobe_flash_upgrade.exe
    Hash: 99ac28bede43ab869b853ba62c4ea243
    The administrator pulls a report from the patch management system with the following output:

    Given the above outputs, which of the following MOST likely happened?
  • Question 188

    A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?
  • Question 189

    Given the output:

    Which of the following account management practices should the security engineer use to mitigate the identified risk?
  • Question 190

    A security administrator has received multiple calls from the help desk about customers who are unable to access the organization's web server. Upon reviewing the log files, the security administrator determines multiple open requests have been made from multiple addresses, which is consuming system resources. Which of the following attack types does this BEST describe?