Mock Exam 2 Assessment
- Answer: b
Concept: EAP-TLS is a secure wireless authentication protocol, as it uses certificates. An X509 certificate is installed on the endpoint. This is the most secure EAP standard.
- Answer: c
Concept: The first stage in any attack is to capture the volatile evidence. In this incident, you would capture the network traffic to identify the source of the attack.
- Answer: b
Concept: A wildcard certificate can be used on multiple servers, normally those that are internet facing.
- Answer: c
Concept: The hot site should be up and running with data that has been replicated.
- Answer: a
Concept: The first step is to create a system image or, if it is a hard drive, create a forensic copy.
- Answer: c
Concept: A Network mapper (Nmap) can identify new hosts on the network, identify what services are running, and identify what operating systems are installed. It can also be used for banner grabbing.
- Answer: a
Concept: IoT home-based automated devices should...