Which of the following attacks would allow an intruder to do port mapping on a company’s internal server fro
Which of the following attacks would allow an intruder to do port mapping on a company’s internal
server from a separate company server on the Internet?
Which of the following would be used to place extranet servers in a separate subnet for security purposes?
Which of the following would be used to place extranet servers in a separate subnet for security
purposes?
Which of the following security appliances are used to only identify traffic on individual systems?
Which of the following security appliances are used to only identify traffic on individual systems?
The security measure used to reduce vulnerabilities for MOST network devices that require regular application
The security measure used to reduce vulnerabilities for MOST network devices that require regular
application and monitoring is:
Which of the following protocols needs to be denied?
A network technician is concerned that an attacker is attempting to penetrate the network, and
wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid
on the network. Which of the following protocols needs to be denied?
Which of the following would a network administrator deploy to implement these requirements?
A company needs to implement a secure wireless system that would require employees to
authenticate to the wireless network with their domain username and password. Which of the
following would a network administrator deploy to implement these requirements? (Select TWO).
Which of the following should be implemented to meet this requirement?
A network administrator must ensure that both the server and the client are authenticated to the
wireless system before access is granted. Which of the following should be implemented to meet
this requirement?
Which of the following services are MOST likely being allowed?
An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall.
Which of the following services are MOST likely being allowed? (Select TWO).
Which of the following would BEST accomplish this?
An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from.
Which of the following would BEST accomplish this?
Which of the following would MOST likely be installed?
A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to
prevent on its own. Which of the following would MOST likely be installed?