Which of the following is the BEST recommendation?
Management has decided that they want a high level of security. They do not want Internet
requests coming directly from users. Which of the following is the BEST recommendation?
Which of the following is the MOST secure wireless encryption method?
A company wants to secure its WAPs from unauthorized access. Which of the following is the
MOST secure wireless encryption method?
Which of the following are common reasons for implementing port security on the firewall?
A customer wants to increase firewall security. Which of the following are common reasons for
implementing port security on the firewall? (Select TWO).
The security measure used to reduce vulnerabilities for MOST network devices that require regular application
The security measure used to reduce vulnerabilities for MOST network devices that require
regular application and monitoring is:
Which of the following appliances creates and manages a large number of secure remote-access sessions, and als
Which of the following appliances creates and manages a large number of secure remote-access
sessions, and also provides a high availability solution?
Which of the following network access security methods ensures communication occurs over a secured, encrypted
Which of the following network access security methods ensures communication occurs over a
secured, encrypted channel, even if the data uses the Internet?
Which of the following technologies would be used?
A network administrator is responding to a statement of direction made by senior management to
implement network protection that will inspect packets as they enter the network. Which of the
following technologies would be used?
Which of the following would BEST provide this functionality?
A network administrator is looking to implement a solution allowing users to utilize a common
password to access most network resources for an organization. Which of the following would
BEST provide this functionality?
which of the following security features for controlling access?
A strong network firewall would likely support which of the following security features for controlling
access? (Select TWO).
Which of the following solutions provides the MOST security from third party tampering?
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A
network administrator is assigned to provide connectivity between the existing office and the new
office. Which of the following solutions provides the MOST security from third party tampering?