which of the following?
Protecting the confidentiality of a message is accomplished by encrypting the message with which
of the following?
Which of the following is MOST likely the source of the problem?
A desktop computer is connected to the network and receives an APIPA address but is unable to
reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the
Internet. Which of the following is MOST likely the source of the problem?
Which of the following algorithms should the software developer utilize?
A software developer utilizes cryptographic functions to generate codes that verify message
integrity. Due to the nature if the data that is being sent back and forth from the client application
to the server, the developer would like to change the cryptographic function to one that verities
both authentication and message integrity. Which of the following algorithms should the software
developer utilize?
Which of the following should be implemented to prevent performance degradation?
A technician is setting up a new network and wants to create redundant paths through the network.
Which of the following should be implemented to prevent performance degradation?
which of the following is the MOST relevant integration issue?
When designing a corporate NAC solution, which of the following is the MOST relevant integration
issue?
Which of the following default port numbers should the technician set the analyzer to highlight when creating
A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has
been experiencing when uploading work to the internal FTP server. Which of the following default
port numbers should the technician set the analyzer to highlight when creating a report? (Select
TWO).
Which of the following access methods uses radio frequency waves for authentication?
Which of the following access methods uses radio frequency waves for authentication?
Which of the following topologies would the engineer implement?
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece
of the topology. However, the computers need to wait to talk on the network to avoid congestions.
Which of the following topologies would the engineer implement?
Which of the following authentication methods can use the SCTP and TLS protocols for reliable packet transmiss
Which of the following authentication methods can use the SCTP and TLS protocols for reliable
packet transmissions?
Which of the following will secure traffic between a web browser and a website?
A technician needs to secure web traffic for a new e-commerce website. Which of the following will
secure traffic between a web browser and a website?