Which of the following rules would accomplish this task?
A network administrator wants to block both DNS requests and zone transfers coming from
outside IP addresses. The company uses a firewall which implements an implicit allow and is
currently configured with the following ACL applied to its external interfacE.
PERMIT TCP ANY ANY 80
PERMIT TCP ANY ANY 443
Which of the following rules would accomplish this task? (Select TWO).
Which of the following file systems can be used in this scenario?
A system administrator is planning storage infrastructure to store backup copies of virtual machines
that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select
TWO).
Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?
A local administrator would like to determine why a laptop is taking so long to boot into the
operating system. Which of the following tabs in MSCONFIG would the administrator access to BEST
determine this?
Which of the following ports is MOST likely being blocked?
A new firewall has recently been installed and several users are now unable to access the Internet.
Which of the following ports is MOST likely being blocked?
Which of the following attacks would cause all mobile devices to lose their association with corporate access
Which of the following attacks would cause all mobile devices to lose their association with
corporate access points while the attack is underway?
Which of the following can be used to enable out-of-band management of a Windows-based host?
Which of the following can be used to enable out-of-band management of a Windows-based host?
Which of the following is the FIRST step he should take in removing the malware?
A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms
malware exists and starts the process of removing the malware. Which of the following is the FIRST
step he should take in removing the malware?
Which of the following would MOST likely need to be configured?
A new secure SOHO is being setup using a wireless network. The users do not want any surrounding
neighbors to be able to use this new network. Which of the following would MOST likely need to be
configured? (Select TWO).
Which of the following can be implemented?
An administrator wants to ensure that the reclaimed space of a hard drive has been
sanitized while the computer is in use. Which of the following can be implemented?
Which of the following might improve the performance of the mouse?
An administrator notices that the mouse does not perform as expected within a VM. Which of the
following might improve the performance of the mouse?