Which of the following protocols should be used in this scenario?
A security administrator wishes to change their wireless network so that IPSec is built into the protocol
and NAT is no longer required for address range extension. Which of the following protocols should be
used in this scenario?
Which of the following replies has the administrator received?
A system administrator attempts to ping a hostname and the response is 2001:4860:0:2001::68.
Which of the following replies has the administrator received?
Which of the following protocols is used by IPv6 for MAC address resolution?
Which of the following protocols is used by IPv6 for MAC address resolution?
Which of the following protocols allows for the LARGEST address space?
Which of the following protocols allows for the LARGEST address space?
Which of the following protocols must he allow through the firewall to ensure the web servers can be reached v
Pete, a network administrator, is implementing IPv6 in the DMZ. Which of the following protocols must
he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6 enabled
Internet host?
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow i
Which of the following ports and protocol types must be opened on a host with a host-based firewall to
allow incoming SFTP connections?
Which of the following protocols is the BEST choice to use?
A network administrator is asked to send a large file containing PII to a business associate.
Which of the following protocols is the BEST choice to use?
Which of the following is a difference between TFTP and FTP?
Which of the following is a difference between TFTP and FTP?
Which of the following is the default port for TFTP?
Which of the following is the default port for TFTP?
Which of the following, by default, would be the BEST choice to accomplish this goal?
A network consists of various remote sites that connect back to two main locations. Pete, the security
administrator, needs to block TELNET access into the network. Which of the following, by default, would
be the BEST choice to accomplish this goal?