Which of the following is the MOST likely cause for this issue?
On Monday, all company employees report being unable to connect to the corporate wireless network,
which uses 802.1x with PEAP. A technician verifies that no configuration changes were made to the
wireless network and its supporting infrastructure, and that there are no outages.
Which of the following is the MOST likely cause for this issue?
Which of the following provides the highest degree of protection from unauthorized wired network access?
A company determines a need for additional protection from rogue devices plugging into physical ports
around the building.
Which of the following provides the highest degree of protection from unauthorized wired network
access?
Which of the following should the administrator implement to ensure this happens?
While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make
sure that only devices authorized to access the network would be permitted to login and utilize
resources. Which of the following should the administrator implement to ensure this happens?
Which of the following rules would accomplish this task?
A network administrator wants to block both DNS requests and zone transfers coming from outside IP
addresses. The company uses a firewall which implements an implicit allow and is currently configured
with the following ACL applied to its external interface.
PERMIT TCP ANY ANY 80
PERMIT TCP ANY ANY 443Which of the following rules would accomplish this task? (Select TWO).
Which of the following can be inferred of a firewall that is configured ONLY with the following ACL?
Users are unable to connect to the web server at IP 192.168.0.20. Which of the following can be inferred
of a firewall that is configured ONLY with the following ACL?
PERMIT TCP ANY HOST 192.168.0.10 EQ 80
PERMIT TCP ANY HOST 192.168.0.10 EQ 443
Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folde
The Human Resources department has a parent shared folder setup on the server. There are two groups
that have access, one called managers and one called staff. There are many sub folders under the parent
shared folder, one is called payroll. The parent folder access control list propagates all subfolders and all
subfolders inherit the parent permission. Which of the following is the quickest way to prevent the staff
group from gaining access to the payroll folder?
Which of the following combinations is BEST to meet the requirements?
A company has several conference rooms with wired network jacks that are used by both employees and
guests. Employees need access to internal resources and guests only need access to the Internet. Which
of the following combinations is BEST to meet the requirements?
How could this BEST be accomplished?
Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor,
and does not want this network to be routable to the firewall. How could this BEST be accomplished?
Which of the following cloud service options would support this requirement?
A Chief Information Security Officer (CISO) is tasked with outsourcing the analysis of security logs. These
will need to still be reviewed on a regular basis to ensure the security of the company has not been
breached. Which of the following cloud service options would support this requirement?
Which of the following should Joe search for in the log files?
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of
a misconfigured router access list, allowing outside access to an SSH server. Which of the following should
Joe search for in the log files?
