Which of the following should be implemented to prevent…
A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent
performance degradation?
Which of the following should Pete implement to BEST ac…
Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the
following should Pete implement to BEST achieve this goal?
Which of the following protocols must be implemented in…
Which of the following protocols must be implemented in order for two switches to share VLAN information?
Which of the following concepts does this illustrate?
A technician has implemented a system in which all workstations on the network will receive security updates on the same schedule. Which of the following
concepts does this illustrate?
Which of the following should an administrator implemen…
A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used.
Which of the following should an administrator implement to prevent future outbreaks?
A periodic update that corrects problems in one version…
A periodic update that corrects problems in one version of a product is called a
Which of the following is the MOST likely mitigation fo…
An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web
server. Which of the following is the MOST likely mitigation for this reported item?
Which of the following encompasses application patch ma…
Which of the following encompasses application patch management?
Which of the following would be required to resolve the…
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to
be reviewed. A recent exploit has caused the company’s encryption to become unsecure. Which of the following would be required to resolve the exploit?
Which of the following is a vulnerability associated wi…
Which of the following is a vulnerability associated with disabling pop-up blockers?