Which of the following ports should be selected to esta…
An active directory setting restricts querying to only secure connections. Which of the following ports should be
selected to establish a successful connection?
which of the following is the MOST important security c…
Ann is an employee in the accounting department and would like to work on files from her home computer. She
recently heard about a new personal cloud storage service with an easy web interface. Before uploading her
work related files into the cloud for access, which of the following is the MOST important security concern Ann
should be aware of?
Which of the following are the MOST likely causes of th…
The loss prevention department has purchased a new application that allows the employees to monitor the
alarm systems at remote locations. However, the application fails to connect to the vendor’s server and the
users are unable to log in. Which of the following are the MOST likely causes of this issue? (Choose two.)
Which of the following technologies would be used to ac…
A security administrator is tasked with ensuring that all devices have updated virus definition files before they
are allowed to access network resources. Which of the following technologies would be used to accomplish this
goal?
Which of the following should be implemented if configu…
A technician wants to securely collect network device configurations and statistics through a scheduled and
automated process. Which of the following should be implemented if configuration integrity is most important
and a credential compromise should not allow interactive logons?
Which of the following ports should be open on the fire…
An organization recently switched from a cloud-based email solution to an in-house email server. The firewall
needs to be modified to allow for sending and receiving email. Which of the following ports should be open on
the firewall to allow for email traffic? (Choose three.)
Which of the following would BEST alleviate the develop…
Ann, the network administrator, is receiving reports regarding a particular wireless network in the building. The
network was implemented for specific machines issued to the developer department, but the developers are
stating that they are having connection issues as well as slow bandwidth. Reviewing the wireless router’s logs,
she sees that devices not belonging to the developers are connecting to the access point. Which of the
following would BEST alleviate the developer’s reports?
Which of the following cloud technologies should she lo…
Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save money while
providing valuable services. She is looking for a cost-effective solution to assist in capacity planning as well as
visibility into the performance of the network. Which of the following cloud technologies should she look into?
Which of the following is the BEST solution?
An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST
solution?
It is MOST important to make sure that the firewall is …
It is MOST important to make sure that the firewall is configured to do the following: