Which of the following should he do to segment that tra…
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic
on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other
traffic?
which all of the employees’ devices are connected?
A network engineer is setting up a network for a company. There is a BYOD policy for the employees so that
they can connect their laptops and mobile devices.
Which of the following technologies should be employed to separate the administrative network from the
network in which all of the employees’ devices are connected?
Which of the following should the company configure to …
A small company can only afford to buy an all-in-one wireless router/switch. The company has 3 wireless BYOD
users and 2 web servers without wireless access. Which of the following should the company configure to
protect the servers from the user devices? (Choose two.)
Which of the following is BEST used to break a group of…
Which of the following is BEST used to break a group of IP addresses into smaller network segments or
blocks?
Which of the following would the security engineer set …
Which of the following would the security engineer set as the subnet mask for the servers below to utilize host
addresses on separate broadcast domains?
Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20
Which of the following IP addresses would be hosts on t…
Which of the following IP addresses would be hosts on the same subnet given the subnet mask
255.255.255.224? (Choose two.)
Which of the following would allow the organization to …
Which of the following would allow the organization to divide a Class C IP address range into several ranges?
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following design elements would be impleme…
When designing a new network infrastructure, a security administrator requests that the intranet web server be
placed in an isolated area of the network for security purposes. Which of the following design elements would
be implemented to comply with the security administrator’s request?
Which of the following network architecture concepts is…
Which of the following network architecture concepts is used to securely isolate at the boundary between
networks?