Which of the following will secure traffic between a we…
A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure
traffic between a web browser and a website?
Which of the following actions should the IT security t…
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their
work computers. Which of the following actions should the IT security team implement to help protect the
network from attack as a result of this new policy?
Which of the following standards should be consulted?
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency
emanations. Which of the following standards should be consulted?
Which of the following is the BEST explanation that des…
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response
from the server. Which of the following is the BEST explanation that describes this scenario?
which of the following attacks?
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an
example of which of the following attacks?
Which of the following should be done to correct this issue?
Multiple students within a networking lab are required to simultaneously access a single switch remotely. The
administrator checks and confirms that the switch can be accessed using the console, but currently only one
student can log in at a time. Which of the following should be done to correct this issue?
Which of the following should be implemented to prevent…
A technician is setting up a new network and wants to create redundant paths through the network. Which of
the following should be implemented to prevent performance degradation?
Which of the following protocols must be implemented in…
Which of the following protocols must be implemented in order for two switches to share VLAN information?
Which of the following is the MOST likely mitigation fo…
An outside organization has completed a penetration test for a company. One of the items on the report is
reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation
for this reported item?
Which of the following requires the network administrat…
Which of the following requires the network administrator to schedule a maintenance window?