Which of the following protocols would be the MOST secure?
A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the
MOST secure?
which of the following?
Configuring the mode, encryption methods, and security associations are part of which of the following?
Which of the following protocols could be used to secure communication by offering encryption at a lower OSI l
A company’s legacy server requires administration using Telnet. Which of the following protocols could
be used to secure communication by offering encryption at a lower OSI layer? (Select TWO).
Which of the following would be configured to provide these reports?
A network administrator needs to provide daily network usage reports on all layer 3 devices without
compromising any data while gathering the information. Which of the following would be configured to
provide these reports?
Which of the following protocols would he need to configure on each device?
Matt, a security administrator, wants to configure all the switches and routers in the network in order to
securely monitor their status. Which of the following protocols would he need to configure on each
device?
Which of the following protocols should be used instead of Telnet?
A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the following
protocols should be used instead of Telnet?
Which of the following is BEST used as a secure replacement for TELNET?
Which of the following is BEST used as a secure replacement for TELNET?
Which of the following protocols would provide secure access?
A security analyst needs to logon to the console to perform maintenance on a remote server. Which of
the following protocols would provide secure access?
Which of the following protocols could be utilized?
A UNIX administrator would like to use native commands to provide a secure way of connecting to other
devices remotely and to securely transfer files. Which of the following protocols could be utilized? (Select
TWO).
which of the following should be powered on FIRST to establish DNS services?
A network technician is on the phone with the system administration team. Power to the server room
was lost and servers need to be restarted. The DNS services must be the first to be restarted. Several
machines are powered off. Assuming each server only provides one service, which of the following should
be powered on FIRST to establish DNS services?