Which of the following types of network would be set up…
Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such
as printers and servers?
which of the following NAC features?
The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which
of the following NAC features?
Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system.
Which of the following should the technician perform?
which of the following manners would meet the company’s…
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any
protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company’s
objectives?
Which of the following would the technician MOST likely…
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the
following would the technician MOST likely configure?
Which of the following should the technician install an…
A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician
install and configure on the laptops if the threat is network based?
Which of the following physical security controls preve…
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
Which of the following would be identified as physical …
During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at
the company. Which of the following would be identified as physical security controls? (Select THREE).
Which of the following could the technician do for vend…
A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username
and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested
the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch?
Which of the following is the BEST security method to i…
A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price
checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to
the wireless networks. There are a finite known number of approved handheld devices needing to access the store’s wireless network. Which of the following is the
BEST security method to implement on the access points?