Question 11

A security administrator is choosing an algorithm to generate password hashes.
Which of the following would offer the BEST protection against offline brute force attacks?
  • Question 12

    After a merger, it was determined that several individuals could perform the tasks of a network
    administrator in the merged organization. Which of the following should have been performed to ensure
    that employees have proper access?
  • Question 13

    A security analyst is hardening a large-scale wireless network. The primary requirements are the following:
    Must use authentication through EAP-TLS certificates
    Must use an AAA server
    Must use the most secure encryption protocol
    Given these requirements, which of the following should the analyst implement and recommend? (Select TWO.)
  • Question 14

    In an effort to reduce data storage requirements, a company devices to hash every file and eliminate duplicates. The data processing routines are time sensitive so the hashing algorithm is fast and supported on a wide range of systems. Which of the following algorithms is BEST suited for this purpose?
  • Question 15

    Which of the following BEST explains how the use of configuration templates reduces organization risk?