Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following would resolve this issue?
The administrator’s network has OSPF for the internal routing protocol. One port going out to the
Internet is congested. The data is going out to the Internet, but queues up before sending. Which of
the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
Which of the following is a wireless encryption solution that the technician should implement while ensuring t
Due to hardware limitation, a technician must implement a wireless encryption algorithm that uses
the RC4 protocol. Which of the following is a wireless encryption solution that the technician
should implement while ensuring the STRONGEST level of security?
Which of the following is the MOST likely mitigation for this reported item?
An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?
Which of the following wireless encryption methods should be implemented?
A security administrator must implement a wireless encryption system to secure mobile devices’
communication. Some users have mobile devices which only support 56-bit encryption. Which of
the following wireless encryption methods should be implemented?
Which of the following procedures should the system administrator perform FIRST?
A system administrator wants to update a web-based application to the latest version. Which of the
following procedures should the system administrator perform FIRST?
Which of the following can use RC4 for encryption?
Which of the following can use RC4 for encryption? (Select TWO).
Which of the following should be done to correct this issue?
Multiple students within a networking lab are required to simultaneously access a single switch
remotely. The administrator checks and confirms that the switch can be accessed using the console,
but currently only one student can log in at a time. Which of the following should be done to correct
this issue?
Which of the following would provide the STRONGEST encryption?
Which of the following would provide the STRONGEST encryption?
Which of the following should the technician install and configure on the laptops if the threat is network bas
A technician needs to install software onto company laptops to protect local running services, from
external threats. Which of the following should the technician install and configure on the laptops if
the threat is network based?