Which of the following is the best option?
A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option?
which of the following?
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?
which of the following technologies to prevent unauthor…
A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
AnyUntrustAnyDMZ80Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
Which of the following is the malicious student impleme…
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious
student implementing?
which of the following network segmentation techniques?
A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route
packages. This is an example of which of the following network segmentation techniques?
Which of the following is an addressing scheme that wil…
Ann, a network technician is preparing to configure a company’s network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on
the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a
proper IP address. Which of the following is an addressing scheme that will work in this situation?
Which of the following is a connectionless protocol?
Which of the following is a connectionless protocol? (Select TWO)
Which of the following should be performed to verify th…
A network administrator is following best practices to implement firewalls, patch management and policies on the network. Which of the following should be
performed to verify the security controls in place?
Which of the following allows a company to maintain acc…
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?
which of the following wireless technologies?
OFDM, QAM and QPSK are all examples of which of the following wireless technologies?