Which of the following should the network administrator deploy to comply with the new collection requirements?
Due to a recent change in company policy, all users managing network infrastructure devices must
use SSH v2 and all administrative activity must be collected on a central store. Which of the
following should the network administrator deploy to comply with the new collection requirements?
Which of the following protocols is used to send time synchronization updates on a given network?
Which of the following protocols is used to send time synchronization updates on a given network?
Which of the following appliances would BEST handle network traffic to increase network performance?
A network is having problems with traffic flowing to several critical websites that are used for
necessary company work. Which of the following appliances would BEST handle network traffic to
increase network performance?
Which of the following wireless router security measures provides access to a network by allowing only devices
Which of the following wireless router security measures provides access to a network by allowing
only devices on an approved physical address list?
Which of the following would be BEST suited for this purpose?
A company needs to find a way to best route latency-sensitive traffic appropriately on an already
congested network. Which of the following would be BEST suited for this purpose?
Which of the following network protocols is used to transport email across the Internet?
Which of the following network protocols is used to transport email across the Internet?
Which of the following BEST describes a load balancer?
Which of the following BEST describes a load balancer?
Which of the following explains why additional corporate traffic cannot be detected?
An administrator has set up a NIPS and connected it to the same switch as the internal firewall
interface and the internal router. The device, however, only detects traffic from itself to the firewall
or router. Which of the following explains why additional corporate traffic cannot be detected?
what software is listening on that port?
An application is using port 2000 on a PC. Which of the following could an administrator do to
determine what software is listening on that port?
which of the following OSI layers?
The TCP/IP application layer contains which of the following OSI layers?