Which of the following would BEST prevent this?
Pete, the system administrator, is concerned about unauthorized access at all entrances into the building. PIN pad readers have been installed, but users have developed the habit of holding the door for others behind them. Which of the following would BEST prevent this?
Which of the following would be Petes BEST option?
Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Petes BEST option?
Which of the following has Jane MOST likely configured on the switch?
Jane, a network administrator, has configured a 48-port switch to isolate four different departments. Which of the following has Jane MOST likely configured on the switch?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?
Which of the following is configured in the RADIUS server and what technologies should the authentication prot
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to?
Which of the following is an important implementation consideration when deploying a wireless network that use
Which of the following is an important implementation consideration when deploying a wireless network that uses a shared password?
Which of the following would satisfy wireless network implementation requirements to use mutual authentication
Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords?
Which of the following network design elements would MOST likely be recommended?
A security analyst needs to ensure all external traffic is able to access the companys front-end servers but protect all access to internal resources. Which of the following network design elements would MOST likely be recommended?
Layer 7 devices used to prevent specific types of html tags are called:
Layer 7 devices used to prevent specific types of html tags are called:
Which of the following allows a network administrator to implement an access control policy based on individua
Which of the following allows a network administrator to implement an access control policy based on individual user characteristics and NOT on job function?