Which of the following would he implement to BEST address this requirement?
Matt, the network engineer, has been tasked with separating network traffic between virtual machines
on a single hypervisor. Which of the following would he implement to BEST address this requirement?
(Select TWO).
Which of the following is the security administrator practicing in this example?
A database administrator contacts a security administrator to request firewall changes for a connection to
a new internal application. The security administrator notices that the new application uses a port
typically monopolized by a virus. The security administrator denies the request and suggests a new port
or service be used to complete the application’s task. Which of the following is the security administrator
practicing in this example?
Which of the following should be configured to prevent unauthorized devices from connecting to the network?
An administrator needs to connect a router in one building to a router in another using Ethernet. Each
router is connected to a managed switch and the switches are connected to each other via a fiber line.
Which of the following should be configured to prevent unauthorized devices from connecting to the
network?
Which of the following would be used to stop unauthorized access?
At an organization, unauthorized users have been accessing network resources via unused network wall
jacks. Which of the following would be used to stop unauthorized access?
Which of the following is the MOST likely cause for this issue?
On Monday, all company employees report being unable to connect to the corporate wireless network,
which uses 802.1x with PEAP. A technician verifies that no configuration changes were made to the
wireless network and its supporting infrastructure, and that there are no outages.
Which of the following is the MOST likely cause for this issue?
Which of the following provides the highest degree of protection from unauthorized wired network access?
A company determines a need for additional protection from rogue devices plugging into physical ports
around the building.
Which of the following provides the highest degree of protection from unauthorized wired network
access?
Which of the following should the administrator implement to ensure this happens?
While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make
sure that only devices authorized to access the network would be permitted to login and utilize
resources. Which of the following should the administrator implement to ensure this happens?
Which of the following rules would accomplish this task?
A network administrator wants to block both DNS requests and zone transfers coming from outside IP
addresses. The company uses a firewall which implements an implicit allow and is currently configured
with the following ACL applied to its external interface.
PERMIT TCP ANY ANY 80
PERMIT TCP ANY ANY 443Which of the following rules would accomplish this task? (Select TWO).
Which of the following can be inferred of a firewall that is configured ONLY with the following ACL?
Users are unable to connect to the web server at IP 192.168.0.20. Which of the following can be inferred
of a firewall that is configured ONLY with the following ACL?
PERMIT TCP ANY HOST 192.168.0.10 EQ 80
PERMIT TCP ANY HOST 192.168.0.10 EQ 443
Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folde
The Human Resources department has a parent shared folder setup on the server. There are two groups
that have access, one called managers and one called staff. There are many sub folders under the parent
shared folder, one is called payroll. The parent folder access control list propagates all subfolders and all
subfolders inherit the parent permission. Which of the following is the quickest way to prevent the staff
group from gaining access to the payroll folder?