Which of the following protocols was MOST likely used o…
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this
cable?
Which of the following is the term for a fix for a know…
Which of the following is the term for a fix for a known software problem?
Which of the following is MOST likely to use an RJ-11 c…
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?
Which of the following should the administrator implement?
An administrator finds that non-production servers are being frequently compromised, production servers are rebooting at unplanned times and kernel versions are
several releases behind the version with all current security fixes.
Which of the following should the administrator implement?
Which of the following protocols uses label-switching r…
Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?
Which of the following could BEST prevent this issue fr…
A recently installed application update caused a vital application to crash during the middle of the workday. The application remained down until a previous version
could be reinstalled on the server, and this resulted in a significant loss of data and revenue.
Which of the following could BEST prevent this issue from occurring again?
Which of the following was MOST likely installed that r…
When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of
the following was MOST likely installed that required an MX record to function properly?
Which of the following processes could MOST effectively…
A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no
process in place for other software updates.
Which of the following processes could MOST effectively mitigate these risks?
Which of the following could the technician do to fix t…
A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the
site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue
while causing internal users to route to the website using an internal address?
Which of the following describes the process of removin…
Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?