Chapter 14: Mock Exam 2
- You are a security administrator, and you wish to implement an encrypted method of authentication for your wireless network. Which of the following protocols is the most secure for your wireless network?
a) WPA2-PSK
b) EAP-TLS
c) WPS
d) PAP
- You work on the cybersecurity team of a large multinational corporation, and you have been alerted to an attack on the web server inside your screened subnet that is used for selling your products on the internet. You can see by running netstat that you have an unknown active connection. What should be the first step you take when investigating this incident?
a) Isolate the web server by disconnecting it from the network to prevent further damage.
b) Disconnect all external active connections to ensure that any attack is stopped.
c) Run a packet sniffer to capture the network traffic to identify the attacker.
d) Take a screenshot of the damage done to the website and report the incident to the police.
- I need to...