Which of the following would BEST alleviate the developer’s reports?
Ann, the network administrator, is receiving reports regarding a particular wireless network in the
building. The network was implemented for specific machines issued to the developer department,
but the developers are stating that they are having connection issues as well as slow bandwidth.
Reviewing the wireless router’s logs, she sees that devices not belonging to the developers are
connecting to the access point. Which of the following would BEST alleviate the developer’s
reports?
Which of the following ports should be open on the firewall to allow for email traffic?
An organization recently switched from a cloud-based email solution to an in-house email server.
The firewall needs to be modified to allow for sending and receiving email. Which of the following
ports should be open on the firewall to allow for email traffic? (Select THREE).
Which of the following should be implemented if configuration integrity is most important and a credential com
A technician wants to securely collect network device configurations and statistics through a
scheduled and automated process. Which of the following should be implemented if configuration
integrity is most important and a credential compromise should not allow interactive logons?
Which of the following technologies would be used to accomplish this goal?
A security administrator is tasked with ensuring that all devices have updated virus definition files
before they are allowed to access network resources. Which of the following technologies would
be used to accomplish this goal?
Which of the following are the MOST likely causes of this issue?
The loss prevention department has purchased a new application that allows the employees to
monitor the alarm systems at remote locations. However, the application fails to connect to the
vendor’s server and the users are unable to log in. Which of the following are the MOST likely
causes of this issue? (Select TWO).
which of the following is the MOST important security concern Ann should be aware of?
Ann is an employee in the accounting department and would like to work on files from her home
computer. She recently heard about a new personal cloud storage service with an easy web
interface. Before uploading her work related files into the cloud for access, which of the following is
the MOST important security concern Ann should be aware of?
Which of the following ports should be selected to establish a successful connection?
An active directory setting restricts querying to only secure connections. Which of the following
ports should be selected to establish a successful connection?
which of the following ports?
Signed digital certificates used to secure communication with a web server are MOST commonly
associated with which of the following ports?
Which of the following network segmentation schemas would BEST meet this objective?
An organization has three divisions: Accounting, Sales, and Human Resources. Users in the
Accounting division require access to a server in the Sales division, but no users in the Human
Resources division should have access to resources in any other division, nor should any users in
the Sales division have access to resources in the Accounting division. Which of the following
network segmentation schemas would BEST meet this objective?
Which of the following would be the BEST course of action for the consultant to recommend?
A retail store uses a wireless network for its employees to access inventory from anywhere in the
store. Due to concerns regarding the aging wireless network, the store manager has brought in a
consultant to harden the network. During the site survey, the consultant discovers that the network
was using WEP encryption. Which of the following would be the BEST course of action for the
consultant to recommend?