Which of the following preventative measures would BEST secure a web server from being port scanned by attacke
Which of the following preventative measures would BEST secure a web server from being port
scanned by attackers publicly?
Which of the following is the underlying cause?
A user calls the helpdesk to report not being able to access network resources over the company’s
Wi-Fi connection. During information gathering, the user mentions that the wireless network their
computer is signed into is not the same name as it had been previously. Which of the following is
the underlying cause?
Which of the following cabling will be needed for the installation?
A consultant has been hired to wire a simple small office of ten computers to a layer 2 Ethernet
100BaseT switch. Which of the following cabling will be needed for the installation?
Which of the following network devices would satisfy this customer’s requirements?
A customer has requested that a new piece of network equipment be installed so that the
customer can have multiple subnets for each department, but allow network traffic from each
department to reach one another without the use of a router. Which of the following network
devices would satisfy this customer’s requirements?
Which of the following is MOST likely the cause?
A user moves from one office to another. When the user logs onto their computer, it has local
access to shared drives but no Internet access. A technician determines that the computer has an
IP address in the wrong subnet. Which of the following is MOST likely the cause?
Which of the following is the MOST likely cause?
A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins
1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same
results. Which of the following is the MOST likely cause?
Which of the following provides RSA encryption at the session layer?
Which of the following provides RSA encryption at the session layer?
Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traf
Which of the following security devices can receive and process HTTP requests from hosts to
allow or deny traffic for web browsing purposes only?
Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network
A security appliance is blocking a DDoS attack on the network. Which of the following logs would
be used to troubleshoot the traffic patterns trying to go across the network?
Which of the following pins are open and keeping traffic from flowing correctly?
The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map
and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open
and keeping traffic from flowing correctly?