Which of the following can be inferred of a firewall th…
Users are unable to connect to the web server at IP 192.168.0.20. Which of the following can be inferred of a
firewall that is configured ONLY with the following ACL?
PERMIT TCP ANY HOST 192.168.0.10 EQ 80
PERMIT TCP ANY HOST 192.168.0.10 EQ 443
Which of the following rules would accomplish this task?
A network administrator wants to block both DNS requests and zone transfers coming from outside IP
addresses. The company uses a firewall which implements an implicit allow and is currently configured with the
following ACL applied to its external interface.
PERMIT TCP ANY ANY 80
PERMIT TCP ANY ANY 443Which of the following rules would accomplish this task? (Choose two.)
Which of the following should the administrator impleme…
While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make sure
that only devices authorized to access the network would be permitted to login and utilize resources. Which of
the following should the administrator implement to ensure this happens?
Which of the following provides the highest degree of p…
A company determines a need for additional protection from rogue devices plugging into physical ports around
the building.
Which of the following provides the highest degree of protection from unauthorized wired network access?
Which of the following is the MOST likely cause for thi…
On Monday, all company employees report being unable to connect to the corporate wireless network, which
uses 802.1x with PEAP. A technician verifies that no configuration changes were made to the wireless network
and its supporting infrastructure, and that there are no outages.
Which of the following is the MOST likely cause for this issue?
Which of the following would be used to stop unauthoriz…
At an organization, unauthorized users have been accessing network resources via unused network wall jacks.
Which of the following would be used to stop unauthorized access?
Which of the following should be configured to prevent …
An administrator needs to connect a router in one building to a router in another using Ethernet. Each router is
connected to a managed switch and the switches are connected to each other via a fiber line. Which of the
following should be configured to prevent unauthorized devices from connecting to the network?
Which of the following is the security administrator pr…
A database administrator contacts a security administrator to request firewall changes for a connection to a new
internal application. The security administrator notices that the new application uses a port typically
monopolized by a virus. The security administrator denies the request and suggests a new port or service be
used to complete the application’s task. Which of the following is the security administrator practicing in this
example?
Which of the following would he implement to BEST addre…
Matt, the network engineer, has been tasked with separating network traffic between virtual machines on a
single hypervisor. Which of the following would he implement to BEST address this requirement? (Choose two.)
Which of the following would need to be implemented?
The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site.
Which of the following would need to be implemented?