Which of the following would accomplish this task?
A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to
unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic.
Which of the following would accomplish this task?
How could Sara BEST accommodate the vendor?
Sara, a security technician, has received notice that a vendor coming in for a presentation will require
access to a server outside of the network. Currently, users are only able to access remote sites through a
VPN connection. How could Sara BEST accommodate the vendor?
Which of the following should be recommended to isolate the VMs from one another?
A technician is deploying virtual machines for multiple customers on a single physical host to reduce
power consumption in a data center. Which of the following should be recommended to isolate the VMs
from one another?
Which of the following is MOST likely the reason for the sub-interfaces?
A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface
has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks.
Which of the following is MOST likely the reason for the sub-interfaces?
Which of the following actions should Joe recommend?
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the
week. Further investigation by the system engineering team determined that a timed .exe file had been
uploaded to the system control console during a visit by international contractors. Which of the following
actions should Joe recommend?
Which of the following would need to be implemented?
The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote
site. Which of the following would need to be implemented?
Which of the following would he implement to BEST address this requirement?
Matt, the network engineer, has been tasked with separating network traffic between virtual machines
on a single hypervisor. Which of the following would he implement to BEST address this requirement?
(Select TWO).
Which of the following is the security administrator practicing in this example?
A database administrator contacts a security administrator to request firewall changes for a connection to
a new internal application. The security administrator notices that the new application uses a port
typically monopolized by a virus. The security administrator denies the request and suggests a new port
or service be used to complete the application’s task. Which of the following is the security administrator
practicing in this example?
Which of the following should be configured to prevent unauthorized devices from connecting to the network?
An administrator needs to connect a router in one building to a router in another using Ethernet. Each
router is connected to a managed switch and the switches are connected to each other via a fiber line.
Which of the following should be configured to prevent unauthorized devices from connecting to the
network?
Which of the following would be used to stop unauthorized access?
At an organization, unauthorized users have been accessing network resources via unused network wall
jacks. Which of the following would be used to stop unauthorized access?
