Which of the following types of network would be set up…
Which of the following types of network would be set up in an office so that customers could access the Internet
but not be given access to internal resources such as printers and servers?
which of the following NAC features?
The ability to make access decisions based on an examination of Windows registry settings, antivirus software,
and AD membership status is an example of which of the following NAC features?
Which of the following should the technician perform?
A technician is installing a surveillance system for a home network. The technician is unsure which ports need
to be opened to allow remote access to the system. Which of the following should the technician perform?
which of the following manners would meet the company’s…
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The
company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to
web browsing only. Reordering the ACL in which of the following manners would meet the company’s
objectives?
Which of the following would the technician MOST likely…
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
other using peer to peer communication. Which of the following would the technician MOST likely configure?
Which of the following should the technician install an…
A technician needs to install software onto company laptops to protect local running services, from external
threats. Which of the following should the technician install and configure on the laptops if the threat is network
based?
Which of the following physical security controls preve…
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
Which of the following would be identified as physical …
During a check of the security control measures of the company network assets, a network administrator is
explaining the difference between the security controls at the company. Which of the following would be
identified as physical security controls? (Select THREE).
Which of the following is the BEST security method to i…
A wireless network technician for a local retail store is installing encrypted access points within the store for
real-time inventory verification, as well as remote price checking capabilities, while employees are away from
the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the
wireless networks. There are a finite known number of approved handheld devices needing to access the
store’s wireless network. Which of the following is the BEST security method to implement on the access
points?
Which of the following should be implemented to reduce …
A company has seen an increase in ransomware across the enterprise. Which of the following should be
implemented to reduce the occurrences?