Which of the following would provide the BEST logical separation of these three device types while still allow
An administrator connects VoIP phones to the same switch as the network PCs and printers.
Which of the following would provide the BEST logical separation of these three device types while
still allowing traffic between them via ACL?
Which of the following would provide the BEST logical separation of these three device types while still allow
An administrator connects VoIP phones to the same switch as the network PCs and printers.
Which of the following would provide the BEST logical separation of these three device types while
still allowing traffic between them via ACL?
Which of the following types of network design elements would MOST likely be used?
An administrator needs to segment internal traffic between layer 2 devices within the LAN. Which
of the following types of network design elements would MOST likely be used?
Which of the following types of network design elements would MOST likely be used?
An administrator needs to segment internal traffic between layer 2 devices within the LAN. Which
of the following types of network design elements would MOST likely be used?
Which of the following is designed to keep the HR department users from accessing the accounting department’
Pete, a security administrator, is informed that people from the HR department should not have
access to the accounting department’s server, and the accounting department should not have
access to the HR department’s server. The network is separated by switches. Which of the
following is designed to keep the HR department users from accessing the accounting
department’s server and vice-versa?
Which of the following would be the simplest way to accomplish this?
According to company policy an administrator must logically keep the Human Resources
department separated from the Accounting department. Which of the following would be the
simplest way to accomplish this?
which of the following can be inferred about the above environment?
Review the following diagram depicting communication between PC1 and PC2 on each side of a
router. Analyze the network traffic logs which show communication between the two computers as
captured by the computer with IP 10.2.2.10.
DIAGRAM
PC1 PC2
[192.168.1.30]——–[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]———[10.2.2.10] LOGS
10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN
10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK
10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK
Given the above information, which of the following can be inferred about the above environment?
The MOST effective way to mask the network address of the users would be by passing the traffic through a:
An administrator wishes to hide the network addresses of an internal network when connecting to
the Internet. The MOST effective way to mask the network address of the users would be by
passing the traffic through a:
Which of the following protocols was used to access the server remotely?
A security analyst is reviewing firewall logs while investigating a compromised web server. The
following ports appear in the log:
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
Which of the following is a programming interface that allows a remote computer to run programs on a local mac
Which of the following is a programming interface that allows a remote computer to run programs
on a local machine?