Which of the following would the security engineer set as the subnet mask for the servers below to utilize hos
Which of the following would the security engineer set as the subnet mask for the servers below to utilize
host addresses on separate broadcast domains?Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20
Which of the following should the company configure to protect the servers from the user devices?
A small company can only afford to buy an all-in-one wireless router/switch. The company has 3 wireless
BYOD users and 2 web servers without wireless access. Which of the following should the company
configure to protect the servers from the user devices? (Select TWO).
which all of the employees’ devices are connected?
A network engineer is setting up a network for a company. There is a BYOD policy for the employees so
that they can connect their laptops and mobile devices.
Which of the following technologies should be employed to separate the administrative network from the
network in which all of the employees’ devices are connected?
Which of the following should he do to segment that traffic from the other traffic?
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the
traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic
from the other traffic?
Which of the following would provide the BEST logical separation of these three device types while still allow
An administrator connects VoIP phones to the same switch as the network PCs and printers. Which of the
following would provide the BEST logical separation of these three device types while still allowing traffic
between them via ACL?
Which of the following types of network design elements would MOST likely be used?
An administrator needs to segment internal traffic between layer 2 devices within the LAN. Which of the
following types of network design elements would MOST likely be used?
Which of the following is designed to keep the HR department users from accessing the accounting department’
Pete, a security administrator, is informed that people from the HR department should not have access to
the accounting department’s server, and the accounting department should not have access to the HR
department’s server. The network is separated by switches. Which of the following is designed to keep
the HR department users from accessing the accounting department’s server and vice-versa?
Which of the following would be the simplest way to accomplish this?
According to company policy an administrator must logically keep the Human Resources department
separated from the Accounting department. Which of the following would be the simplest way to
accomplish this?
which of the following can be inferred about the above environment?
Review the following diagram depicting communication between PC1 and PC2 on each side of a router.
Analyze the network traffic logs which show communication between the two computers as captured by
the computer with IP 10.2.2.10.
DIAGRAM
PC1 PC2
[192.168.1.30]——–[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]———[10.2.2.10] LOGS
10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK
10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK
Given the above information, which of the following can be inferred about the above environment?
The MOST effective way to mask the network address of the users would be by passing the traffic through a:
An administrator wishes to hide the network addresses of an internal network when connecting to the
Internet. The MOST effective way to mask the network address of the users would be by passing the
traffic through a:
