Question 301

A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.

Question 302

Joe notices there are several user accounts on the local network generating spam with embedded malicious code. Which of the following technical control should Joe put in place to BEST reduce these incidents?
  • Question 303

    A network administrator wants to gather information on the security of the network servers in the DMZ. The administrator runs the following command:

    Which of the following actions is the administrator performing?
  • Question 304

    A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login.
    Which of the following should the systems administrator configure?
  • Question 305

    A user of the wireless network is unable to gain access to the network. The symptoms are:
    1.) Unable to connect to both internal and Internet resources
    2.) The wireless icon shows connectivity but has no network access
    The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate.
    Which of the following is the MOST likely cause of the connectivity issues?