Which of the following rules will prevent this?
A network technician has been notified that several PCs are infected and are sending spam emails. The technician wants to add a rule to the firewall to prevent the sending of emails from the internal network. Which of the following rules will prevent this?
Which of the following is the MOST likely cause of the error?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
Which of the following protocols could be used?
A network technician is setting up a router and wants to ensure fast convergence of the routing information. Which of the following protocols could be used?
Which of the following tools can be used to identify the IP and MAC address of the users PC?
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the users PC?
Which of the following should be used?
A network technician needs to push changes out to network devices and also monitor the devices based on each device# s MIB. Which of the following should be used?
Which of the following would only alert a network technician of a possible attack, but take no action to stop
Which of the following would only alert a network technician of a possible attack, but take no action to stop the attack?
Which of the following methods could be used to provide a false customer database to the attacker?
A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?
Which of the following services could be used in this scenario?
An administrator is responsible for one Linux and two Windows servers. The administrator would like to review all server logs centrally. Which of the following services could be used in this scenario?
The process that allows for authentication between computers as a precursor to IPSec is:
The process that allows for authentication between computers as a precursor to IPSec is:
which of the following?
A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which of the following?
