Which of the following features on the switch should th…
The network administrator is configuring a switch port for a file server with a dual NIC. The file server needs to be configured for redundancy and both ports on the
NIC need to be combined for maximum throughput. Which of the following features on the switch should the network administrator use?
Which of the following would be the BEST way to manage …
A new network administrator is setting up a new file server for the company. Which of the following would be the BEST way to manage folder security?
Which of the following technologies would be able to de…
A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which of the following technologies would be able to detect and block
this traffic?
Which of the following is BEST suited when assigning us…
A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when
assigning user rights to individuals in the sales department?
Which of the following cloud infrastructure designs inc…
Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for
review?
Which of the following should be performed?
During an audit, the security administrator discovers that there are several users that are no longer employed with the company but still have active user accounts.
Which of the following should be performed?
which of the following attacks?
A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to
access the network. This describes which of the following attacks?
Which of the following security benefits would be gaine…
Which of the following security benefits would be gained by disabling a terminated user account rather than deleting it?
Which of the following would the technician use to view…
A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the
website and find the user browsing it?
Which of the following controls mitigates the risk of M…
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee’s credential?