Which of the following ports MUST be configured to allow active FTP connections?
While securing a network it is decided to allow active FTP connections into the network. Which of the
following ports MUST be configured to allow active FTP connections? (Select TWO).
Which of the following solutions should be implemented?
An administrator needs to secure a wireless network and restrict access based on the hardware address
of the device. Which of the following solutions should be implemented?
Which of the following is the MOST secure ACL to implement at the company’s gateway firewall?
A security administrator must implement a firewall rule to allow remote employees to VPN onto the
company network. The VPN concentrator implements SSL VPN over the standard HTTPS port. Which of
the following is the MOST secure ACL to implement at the company’s gateway firewall?
which of the following?
It is MOST important to make sure that the firewall is configured to do which of the following?
Which of the following is the BEST solution?
An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST
solution?
Which of the following cloud technologies should she look into?
Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save money
while providing valuable services. She is looking for a cost-effective solution to assist in capacity planning
as well as visibility into the performance of the network. Which of the following cloud technologies should
she look into?
Which of the following would BEST alleviate the developer’s reports?
Ann, the network administrator, is receiving reports regarding a particular wireless network in the
building. The network was implemented for specific machines issued to the developer department, but
the developers are stating that they are having connection issues as well as slow bandwidth. Reviewing
the wireless router’s logs, she sees that devices not belonging to the developers are connecting to the
access point. Which of the following would BEST alleviate the developer’s reports?
Which of the following ports should be open on the firewall to allow for email traffic?
An organization recently switched from a cloud-based email solution to an in-house email server. The
firewall needs to be modified to allow for sending and receiving email. Which of the following ports
should be open on the firewall to allow for email traffic? (Select THREE).
Which of the following should be implemented if configuration integrity is most important and a credential com
A technician wants to securely collect network device configurations and statistics through a scheduled
and automated process. Which of the following should be implemented if configuration integrity is most
important and a credential compromise should not allow interactive logons?
Which of the following technologies would be used to accomplish this goal?
A security administrator is tasked with ensuring that all devices have updated virus definition files before
they are allowed to access network resources. Which of the following technologies would be used to
accomplish this goal?