Which of the following is the BEST solution?
An administrator needs to secure RADIUS traffic between two servers. Which of the following is
the BEST solution?
Which of the following cloud technologies should she look into?
Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save
money while providing valuable services. She is looking for a cost-effective solution to assist in
capacity planning as well as visibility into the performance of the network. Which of the following
cloud technologies should she look into?
Which of the following would BEST alleviate the developer’s reports?
Ann, the network administrator, is receiving reports regarding a particular wireless network in the
building. The network was implemented for specific machines issued to the developer department,
but the developers are stating that they are having connection issues as well as slow bandwidth.
Reviewing the wireless router’s logs, she sees that devices not belonging to the developers are
connecting to the access point. Which of the following would BEST alleviate the developer’s
reports?
Which of the following ports should be open on the firewall to allow for email traffic?
An organization recently switched from a cloud-based email solution to an in-house email server.
The firewall needs to be modified to allow for sending and receiving email. Which of the following
ports should be open on the firewall to allow for email traffic? (Select THREE).
Which of the following should be implemented if configuration integrity is most important and a credential com
A technician wants to securely collect network device configurations and statistics through a
scheduled and automated process. Which of the following should be implemented if configuration
integrity is most important and a credential compromise should not allow interactive logons?
Which of the following technologies would be used to accomplish this goal?
A security administrator is tasked with ensuring that all devices have updated virus definition files
before they are allowed to access network resources. Which of the following technologies would
be used to accomplish this goal?
Which of the following are the MOST likely causes of this issue?
The loss prevention department has purchased a new application that allows the employees to
monitor the alarm systems at remote locations. However, the application fails to connect to the
vendor’s server and the users are unable to log in. Which of the following are the MOST likely
causes of this issue? (Select TWO).
which of the following is the MOST important security concern Ann should be aware of?
Ann is an employee in the accounting department and would like to work on files from her home
computer. She recently heard about a new personal cloud storage service with an easy web
interface. Before uploading her work related files into the cloud for access, which of the following is
the MOST important security concern Ann should be aware of?
Which of the following ports should be selected to establish a successful connection?
An active directory setting restricts querying to only secure connections. Which of the following
ports should be selected to establish a successful connection?
which of the following ports?
Signed digital certificates used to secure communication with a web server are MOST commonly
associated with which of the following ports?