Which of the following is the MOST secure ACL to implem…
A security administrator must implement a firewall rule to allow remote employees to VPN onto the companynetwork. The VPN concentrator implements SSL VPN over the standard HTTPS port. Which of the following is
the MOST secure ACL to implement at the company’s gateway firewall?
Which of the following solutions should be implemented?
An administrator needs to secure a wireless network and restrict access based on the hardware address of the
device. Which of the following solutions should be implemented?
Which of the following ports MUST be configured to allo…
While securing a network it is decided to allow active FTP connections into the network. Which of the following
ports MUST be configured to allow active FTP connections? (Choose two.)
The common method of breaking larger network address sp…
The common method of breaking larger network address space into smaller networks is known as:
Which of the following would be MOST appropriate to sec…
Which of the following would be MOST appropriate to secure an existing SCADA system by preventing
connections from unauthorized networks?
Which of the following is a directional antenna that ca…
Which of the following is a directional antenna that can be used in point-to-point or point-to-multi-point WiFi
communication systems? (Choose two.)
Which of the following management controls should be in…
An overseas branch office within a company has many more technical and non-technical security incidents than
other parts of the company. Which of the following management controls should be introduced to the branch
office to improve their state of security?
Which of the following should the administrator configu…
A company administrator has a firewall with an outside interface connected to the Internet and an inside
interface connected to the corporate network. Which of the following should the administrator configure to
redirect traffic destined for the default HTTP port on the outside interface to an internal server listening on port
8080?
Which of the following is the BEST way to run the malwa…
A Windows-based computer is infected with malware and is running too slowly to boot and run a malware
scanner. Which of the following is the BEST way to run the malware scanner?
Which of the following is the MOST likely cause?
A company has recently implemented a high density wireless system by having a junior technician install two
new access points for every access point already deployed. Users are now reporting random wireless
disconnections and slow network connectivity. Which of the following is the MOST likely cause?